
Attack on Google OAuth using abandoned domains
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
1035 articles
A vulnerability in Google OAuth allows attackers to access accounts of defunct organizations through abandoned domains.
Just a few hours before 2025, we recorded a surge in cryptominer distribution through video games. Interestingly, not only home PCs but also corporate machines were affected.
New research demonstrates for the first time how hardware vulnerabilities in modern CPUs can be exploited in practice.
$3 billion worth of damage to healthcare insurance giant, schools closed, soccer club players’ data leaked, and other ransomware incidents in 2024.
Researchers have discovered a vulnerability in the 7-Zip file archiver software.
The complete story of the hype, panic, and misunderstanding surrounding attacks on cryptographic algorithms using quantum computers.
Cybercriminals distributing the Mamont banker under the guise of an application for tracking the delivery of goods at wholesale prices.
The patch that fixes CVE-2024-49040 in Microsoft Exchange is temporarily unavailable. We’ve implemented heuristics that detect attempts to exploit it.
Malicious packages for AI integration containing infostealer malware were found in the Python Package Index repository.
A vulnerability that permits bypassing authentication has been found in a popular security hardening plugin for WordPress.
Exploitation of vulnerability CVE-2024-43451 allows an attacker to steal an NTLMv2 hash with minimal interaction from the victim.
Hackers continue to target developers: during a fake job interview, they ask “potential employees” to run a script from GitHub that hides a backdoor.
Why cybersecurity in education is critical, and how to protect schools from attacks.
Our developments, products, research, patents and expert teams harnessed for AI.
An Office 365 security alert as bait in a phishing email.
Where and why quantum-resistant cryptography has already been implemented, and what compatibility issues it caused.
A paper from Uruguayan scientists lays out a highly technical and impractical method of spying on computer monitors.
Windows Downdate is an attack that can roll back updates to your OS to reintroduce vulnerabilities and allow attackers to take full control of your system. How to mitigate the risk?
Cybercriminals are using AitM techniques to compromise accounts of company executives. How do they do this, and how to protect against it?