Researchers published a proof of concept for a vulnerability in Honda’s remote keyless system. A video has been posted by the researchers demonstrating by using radio transceiver to lock, unlock,…
The incident response and threat intelligence firm Volexity discovered a Chinese threat actor employing a macOS variant of the malware known as Gimmick. The Chinese APT known as Storm Cloud…
A China-based APT known as Mustang Panda is linked to an ongoing cyber-espionage campaign using PlugX trojan for remote access on infected machines. ESET called the new version Hodur because…
Okta, a cloud-based software that enables its customers to manage and secure user authentication into applications. According to its website, the software giant currently has over 15,000 customers. Okta announced…
A new phishing technique called browser-in-the-browser (BitB) attack can be used to simulate a browser window in the browser to spoof a legitimate domain, making it possible to launch persuasive…
Researchers from Qualys has reported that roughly three months after its discovery late last year, some 30% of Log4j instances remain vulnerable. It has scanned more than 150 million IT…
With Russian attack on Ukraine nearing a month, unconventional actors continue to target Russian state-backed businesses with a string of hacks and data leaks the latest apparently referencing pro-hacktivism comments…
The OpenSSL Project has fixed a vulnerability in several versions of the software that could enable an attacker to cause a DoS condition on machines that are targetted. The bug…