NuGet, PyPi and npm inundated with malicious packages
Signed Microsoft Drivers Used in Attacks Against Businesses
In some cases, the threat actor’s intent was to ultimately provide SIM-swapping services
AgentTesla Remains Most Prolific Malware in November, Emotet and Qbot Grow
These are some of the key findings from the latest Check Point Research Most Wanted report
Apple Fixes Actively Exploited iPhone Zero-Day Vulnerability
The vulnerability could allow remote code execution (RCE) on a victim’s device
You?ve Crossed the Line ? Disturbing a Host?s Rest
Akamai researchers explore two new vulnerabilities that can be exploited to lead to denial-of-service attacks against container and session services.
New Google Tool Helps Devs Root Out Open Source Bugs
Free OSV-Scanner searches transitive dependencies
Loan Fee Fraud Surges by a Fifth as Christmas Approaches
FCA warns of pressure tactics as cost of living bites
Twitter Addresses November Data Leak Claims
No passwords were reportedly exposed, but Twitter prompted users to enable 2FA to protect accounts
California Hit By Cyber-Attack, LockBit Claims Responsibility
At the time of writing, the California Budget website remains offline