Skip to content
Sitemap
- Although containers are great, be aware of the security risks.
- Fronton: Russian IoT Botnet Created to Conduct Social Media Disinformation Campaigns
- PayPal Pays a Hacker $200,000 for Discovering ‘One-Click-Hack’ Vulnerability
- Chinese “Twisted Panda” Hackers Caught Spying on Russian Defense Institutes
- Researchers Find Backdoor in School Management Plugin for WordPress
- Cisco issues patches for new IOSXR zero-day vulnerability discovered in the wild
- Microsoft Warns Rise in XorDdos Malware Targeting Linux Devices
- Cytrox’s Predator Spyware Target Android Users with Zero-Day Exploits
- Researchers Find Rust Supply Chain Attack on Cloud CI Pipelines
- Hackers Exploiting VMware Horizon to Target South Korea with NukeSped Backdoor
- Hackers Trick Users with Fake Windows 11 Downloads to Distribute Vidar Malware
- QNAP Urges Users to Update NAS Devices to Prevent Deadbolt Ransomware Attacks
- A new Bluetooth hack could allow attackers to remotely unlock smart locks and cars
- 7 Key Findings from the 2022 SaaS Security Survey Report
- High-Severity Bug Reported in Google’s OAuth Client Library for Java
- Web trackers caught intercepting online forms before users hit submit
- VMware Releases Patches for New Vulnerabilities Affecting Multiple Products
- How to Protect Your Data When Ransomware Strikes
- Researchers Expose Inner Workings of Billion-Dollar Wizard Spider Cybercrime Gang
- [eBook] Your 90-Day MSSP Plan: How to Improve Margins and Scale-Up Service Delivery
- Hackers gain fileless persistence on targeted SQL servers using a built-in utility
- U.S. U.S. Warns against North Korean Hackers posing as IT Freelancers
- Microsoft warns about “Cryware”, Info-Stealing Malware Targeting Crypto Wallets
- Russian Conti Ransomware Gang Threatens To Overthrow Costa Rican Government
- Swift UpdateAgent Returned with a New MacOS Malware Dropper
- Do You Think It’s Worth Investing to Secure Your Cloud Data?
- U.S. Charges Venezuelan Doctor for Using and Selling Thanos Ransomware
- New Sysrv Botnet Variant Hijacking Windows and Linux with Crypto Miners
- Over 200 Apps on Play Store Caught Spying on Android Users Using Facestealer
- Watch Out! Hackers Begin Exploiting Recent Zyxel Firewalls RCE Vulnerability
- Fake Clickjacking Bug Bounty Reports: The Key Facts
- Researchers Find Way to Run Malware on iPhone Even When It’s OFF
- Researchers Warn of “Eternity Project” Malware Service Being Sold via Telegram
- Europe Agrees to Adopt New NIS2 Directive Aimed at Hardening Cybersecurity
- Ukrainian Hacker Jailed for 4-Years in U.S. for Selling Access to Hacked Servers
- Get Lifetime Access to 2022 Cybersecurity Certification Prep Courses @ 95% Off
- SonicWall Releases Patches for New Flaws Affecting SSLVPN SMA1000 Devices
- Google has created an ‘Open Source Maintenance Crew to Secure Critical Projects
- New Saitama backdoor Targeted Official from Jordan’s Foreign Ministry
- Zyxel releases patch for critical firewall OS command injection vulnerability
- Iranian Hackers Leveraging BitLocker and DiskCryptor in Ransomware Attacks
- E.U. E.U. proposes new rules for tech companies to combat online child sexual abuse
- Hackers Redirect Users to Scam Sites from Thousands Of WordPress Sites
- Android and Chrome Users Can Soon Generate Virtual Credit Cards to Protect Real Ones
- Everything We Learned From the LAPSUS$ Attacks
- Warning from Government Agencies: Cyberattacks on MSPs are increasing
- CISA Urges Organizations to Patch Actively Exploited F5 BIG-IP Vulnerability
- Hackers Deploy IceApple Exploitation Framework on Hacked MS Exchange Servers
- [White Paper] Social Engineering: What You Need to Know to Stay Resilient
- Bitter APT Hackers Add Bangladesh to Their List of Targets in South Asia
- Researchers Warn of Nerbian RAT Targeting Entities in Italy, Spain, and the U.K
- Malicious NPM Packages Target German Companies in Supply Chain Attack
- E.U. Blames Russia for Cyberattack on KA-SAT Satellite Network Operated by Viasat
- Microsoft Releases Fix for New Zero-Day with May 2022 Patch Tuesday Updates
- 5 Benefits of Detection-as-Code
- New REvil Samples Indicate Ransomware Gang is Back After Months of Inactivity
- Experts Detail Saintstealer and Prynt Stealer Info-Stealing Malware Families
- Microsoft Mitigates RCE Vulnerability Affecting Azure Synapse and Data Factory
- U.S. Proposes $1 Million Fine on Colonial Pipeline for Safety Violations After Cyberattack
- Critical Gems Takeover Bug Reported in RubyGems Package Manager
- SHIELDS UP in bite sized chunks
- Experts Sound Alarm on DCRat Backdoor Being Sold on Russian Hacking Forums
- Another Set of Joker Trojan-Laced Android Apps Resurfaces on Google Play Store
- Ukrainian CERT Warns Citizens of a New Wave of Attacks Distributing Jester Malware
- U.S. Offering $10 Million Reward for Information on Conti Ransomware Hackers
- Researchers Develop RCE Exploit for the Latest F5 BIG-IP Vulnerability
- U.S. Sanctions Cryptocurrency Mixer Blender for Helping North Korea Launder Millions
- The New Fileless Malware Blocks Shellcode from Windows Event Logs
- QNAP Releases Firmware Patches for 9 New Flaws Affecting NAS Devices
- Researchers Warn of ‘Raspberry Robin’ Malware Spreading via External Drives
- Hackers Using PrivateLoader PPI Service to Distribute New NetDooka Malware
- Experts Uncover New Espionage Attacks by Chinese ‘Mustang Panda’ Hackers
- Google Releases Android Update to Patch Actively Exploited Vulnerability
- NIST Releases Updated Cybersecurity Guidance for Managing Supply Chain Risks
- Google will add Passwordless Authentication to Android and Google Chrome
- How Important is it to Defining Secure Coding
- Researchers Disclose 10-Year-Old Vulnerabilities in Avast and AVG Antivirus
- Heroku Forces User Password Resets Following GitHub OAuth Token Theft
- Thousands of Borrowers’ Data Exposed from ENCollect Debt Collection Service
- Cisco Issues Patches for 3 New Flaws Affecting Enterprise NFVIS Software
- F5 Warns of a New Critical BIG-IP Remote Code Execution Vulnerability
- SEC Plans to Hire More Staff in Crypto Enforcement Unit to Fight Frauds
- Chinese hackers caught stealing intellectual property from multinational companies
- Report of a Critical RCE Problem in the dotCMS Content Management Software
- The Lure of Choice For a Large Range of Hackers: Ukraine War Themed Files
- Experts Analyze Conti and Hive Ransomware Gangs’ Chats With Their Victims
- Critical TLStorm 2.0 Bugs Affect Widely-Used Aruba and Avaya Network Switches
- AvosLocker Ransomware Variant Using New Trick to Disable Antivirus Protection
- Chinese hackers discovered that popular antivirus products are being used to target the telecom sector.
- Unpatched DNS Related Vulnerability Affects a Wide Range of IoT Devices
- New Hacker Group Pursuing Corporate Employees Focused on Mergers and Acquisitions
- GitHub Says Recent Attack Involving Stolen OAuth Tokens Was “Highly Targeted”
- Which Hole to Plug First? Fixing Chronic Vulnerability Overload
- Chinese “Override Panda” Hackers Resurface With New Espionage Attacks
- Russian Hackers Targeting Diplomatic Entities in Europe, Americas, and Asia
- Google Releases First Developer Preview of Privacy Sandbox on Android 13
- Here’s a New Tool That Scans Open-Source Repositories for Malicious Packages
- Microsoft Documents Over 200 Cyberattacks by Russia Against Ukraine
- Microsoft Azure Vulnerability Exposes PostgreSQL Databases to Other Customers
- Indian Govt Orders Organisations to Report Security Breaches Within 6 Hours to CERT-In
- Experts Detail 3 Hacking Teams Working Under the Umbrella of TA410 Group
- Everything you need to know to create a Vulnerability Assessment Report
- Cybercriminals Using New Malware Loader ‘Bumblebee’ in the Wild
- Twitter’s New Owner Elon Musk Wants DMs to be End-to-End Encrypted like Signal
- A new RIG Exploit Kit campaign infects victims’ computers with RedLine Stealer
- U.S Cybersecurity Agency Lists 2021’s Top 15 Most Exploited Software Vulnerabilities
- CloudFlare Thwarts Record DDoS Attack Peaking at 15 Million Requests Per Second
- QNAP Advises to Mitigate Remote Hacking Flaws Until Patches are Available
- [eBook] Your First 90 Days as MSSP: 10 Steps to Success
- Chinese Hackers Targeting Russian Military Personnel with Updated PlugX Malware
- Google’s New Safety Section Shows What Data Android Apps Collect About Users
- U.S. Offers $10 Million Bounty for Information on 6 Russian Military Hackers
- NPM Bug Allowed Attackers to Distribute Malware as Legitimate Packages
- Microsoft Discovers New Privilege Escalation Flaws in Linux Operating System
- Emotet Testing New Delivery Ideas After Microsoft Disables VBA Macros by Default
- Gold Ulrick Hackers Still in Action Despite Massive Conti Ransomware Leak
- North Korean Hackers Target Journalists with GOLDBACKDOOR Malware
- Iranian Hackers Use VMware RCE Bug To Deploy Core Impact Backdoor
- Researchers Report Critical RCE Vulnerability in Google’s VirusTotal Platform
- Critical Bug in Everscale Wallet Could’ve Let Attackers Steal Cryptocurrencies
- New BotenaGo Malware Variant Targeting Lilin Security Camera DVR Devices
- FBI Warns of BlackCat Ransomware That Breached Over 60 Organisations Worldwide
- T-Mobile Admits Lapsus$ Hackers Gained Access to its Internal Tools and Source Code
- Atlassian drops patches for Critical Jira authentication bypass vulnerability
- PoC released by Researcher for Java Cryptographic Vulnerability
- Watch Out! Cryptocurrency Miners Targeting Dockers, AWS and Alibaba Cloud
- QNAP Advises Users to Update NAS Firmware to Patch Apache HTTP Vulnerabilities
- Cisco Releases Security Patches for TelePresence, RoomOS and Umbrella VA
- Hackers sneak ‘More_Eggs” Malware into Resumes for Corporate Hiring Managers
- Amazon’s Hotpatch for Log4j Flaw Found Vulnerable to Privilege Escalation Bug
- RainLoop Webmail could have a bug that isn’t fixed, which may give hackers access to all emails
- Critical Chipset Bugs Open Millions of Android Devices to Remote Spying
- New Incident Report Reveals How Hive Ransomware Targets Organizations
- Five Eyes Nations warn of Russian cyber attacks on critical infrastructure
- Google Project Zero Detects a Record Number of Zero-Day Exploits in 2021
- Researchers Detail Bug That Could Paralyze Snort Intrusion Detection System
- Okta says that only two of its customers were affected by a security breach caused by the Lapsus$ hackers
- [eBook] The Ultimate Security for Management Presentation Template
- Hackers Exploiting Recently Reported Windows Print Spooler Vulnerability in the Wild
- Experts Uncover Spyware Attacks Against Catalan Politicians and Activists
- New Lenovo UEFI Firmware Vulnerabilities Affect Millions of Laptops
- FBI, U.S. Treasury and CISA Warns of North Korean Hackers Targeting Blockchain Companies
- Github notifies victims whose private data was stolen using OAuth Tokens
- Researchers Share in-Depth Analysis on PYSA Ransomware Group
- Benchmarking Linux Security: Latest Research Findings
- New SolarMarker Malware Variant Using Updated Techniques to Stay Under the Radar
- A new hacking campaign targets the Ukrainian government with IcedID Malware
- WordPress Elementor Website Building Plugin: Critical RCE flaw reported
- Get Lifetime Access to This 60-Hour Java Programming Training Bundle @ 97% Discount
- Lazarus Group Behind $540 Million Axie Infinity Crypto Hack and Attacks on Chemical Sector
- GitHub Says Hackers Breach Dozens of Organizations Using Stolen OAuth Access Tokens
- JekyllBot:5 Flaws Let Attackers Take Control of Aethon TUG Hospital Robots
- Haskers Gang Gives Away ZingoStealer Malware to Other Cybercriminals for Free
- The World is Responding to Cyber-Terrorist Threats from State-Backed Countries
- Cisco Wireless LAN Controller Software: Critical Auth Bypass Problem Reported
- A Critical VMware Cloud Director Issue Could Allow Hackers to Takeover the Whole Cloud Infrastructure
- Google Issues Urgent Chrome Update To Patch Zero-Day Exploited Flaw
- Ethereum Developer Jailed 63 Months for Helping North Korea Evade Sanctions
- Rarible NFT Marketplace Flaw Could’ve Let Attackers Hijack Crypto Wallets
- New EnemyBot DDoS Botnet Borrows Exploit Code from Mirai and Gafgyt
- Microsoft Disrupts ZLoader Cybercrime Botnet in Global Operation
- U.S. Warns of APT Hackers Targeting ICS/SCADA Systems with Specialized Malware
- Critical VMware Workspace ONE Access Flaw Under Active Exploitation in the Wild
- Webinar: How The Right XDR Can Be a Game-Changer for Lean Security Teams
- Microsoft Comes Out with Chinese Tarrask Malware to Attack Windows Computers
- Russian Hackers Tried Attacking Ukraine’s Power Grid with Industroyer2 Malware
- FBI, Europol Seize RaidForums Hacker Forum and Arrest Admin
- Microsoft Issues Patches for 2 Windows Zero-Days and 126 Other Vulnerabilities
- Cross-Regional Disaster Recovery with Elasticsearch
- Hashnode Blogging Platform Reports Critical LFI Vulnerability
- Finding Attack Paths in Cloud Environments
- EU officials reported to be targeted with Israeli Pegasus spyware
- NGINX shares mitigations for zero-day bug affecting LDAP implementation
- Google Sues Scammer for Running ‘Puppy Fraud Scheme’ Website
- Over 16,500 Sites Hacked to Distribute Malware via Web Redirect Service
- Research warns of FFDroider/Lightning info-stealers that target wild users
- Microsoft’s new Autopatch feature will help businesses keep their systems up-to-date.
- Hackers Exploiting Spring4Shell Vulnerability to Deploy Mirai Botnet Malware
- Chinese Hacker Organizations Keep Targeting Indian Power Grid Assets
- Researchers link BlackCat Ransomware to Past BlackMatter Malware Activity
- Ukrainian FIN7 Hacker Gets 5-Year Sentence in the United States
- Microsoft gets a court order to take down domains used to target Ukraine
- FAKE Apps in Google Play Store Spread New Octo Banking Trojan
- The first Malware Targeting AWS Lambda Serverless Platform Found
- Hamas-linked hackers target high-ranking Israelis using ‘Catfish’ lures
- Into the Breach: Breaking Down 3 SaaS App Cyber Attacks in 2022
- SharkBot Banking Trojan Resurfaces On Google Play Store Hidden Behind 7 New Apps
- Researchers Find Out How Colibri Malware Remains Persistent in Hacked Systems
- FBI Shut Down Russia-linked “Cyclops Blink” Botnet That Infected Thousands of Devices
- VMware Releases Critical Patches for New Vulnerabilities Affecting Multiple Products
- Cyber Security WEBINAR — How to Ace Your InfoSec Board Deck
- Hackers Distributing Fake Shopping Apps to Steal Banking Data of Malaysian Users
- Ukraine Warns of Cyber attack Aiming to Hack Users’ Telegram Messenger Accounts
- Block Admits Data Breach Involving Cash App Data Accessed by Former Employee
- U.S. Treasury Department Sanctions Russia-based Hydra Darknet Marketplace
- Battling Cybersecurity Risk: How to Start Somewhere, Right Now
- FIN7 Hackers Leveraging Password Reuse and Software Supply Chain Attacks
- Germany Shuts Down Russian Hydra DarkNet Market; Seize $25 Million in Bitcoin
- Are You Using API Security?
- Researchers Trace Widespread Espionage Attacks Back to Chinese ‘Cicada’ Hackers
- Hackers Breach Mailchimp Email Marketing Firm to Launch Crypto Phishing Scams
- CISA Warns of Active Exploitation of Critical Spring4Shell Vulnerability
- Researchers Uncover New Android Spyware With C2 Server Linked to Turla Hackers
- Multiple Hacker Groups Capitalizing on Ukraine Conflict for Distributing Malware
- Brokenwire Hack Could Let Remote Attackers Disrupt Charging for Electric Vehicles
- Experts Shed Light on BlackGuard Infostealer Malware Sold on Russian Hacking Forums
- Beastmode DDoS Botnet Exploiting New TOTOLINK Bugs to Enslave More Routers
- 15-Year-Old Bug in PEAR PHP Repository Could’ve Enabled Supply Chain Attacks
- British Police Charge Two Teenagers Linked to LAPSUS$ Hacker Group
- GitLab Releases Patch for Critical Vulnerability That Could Let Attackers Hijack Accounts
- Russian Wiper Malware May be Behind the Recent Cyberattack on Viasat KA–SAT Modems
- Critical Bugs in Rockwell PLC Could Allow Hackers to Implant Malicious Code
- Results Overview: 2022 MITRE ATT&CK Evaluation – Wizard Spider and Sandworm Edition
- Chinese Hackers Target VMware Horizon Servers with Log4Shell to Deploy Rootkit
- North Korean hackers distribute Trojanized DeFi Wallet apps to steal victims’ crypto
- Zyxel releases patches for critical bugs affecting business firewalls and VPN devices
- Apple Issues Patches for 2 Actively Exploited Zero-Days in iPhone, iPad and Mac Devices
- Security Patch Releases for Critical Zero-Day Bug in Java Spring Framework
- Bugs in Wyze Cams Could Let Attackers Takeover Devices and Access Video Feeds
- Ransomware based on Python targets JupyterLab web notebooks
- Hackers Increasingly Using ‘Browser in a Browser’ Technique in Ukraine Related Attacks
- Unpatched Java Spring Framework 0-Day RCE Bug Threatens Enterprise Web Apps Security
- QNAP Warns of OpenSSL Infinite Loop Vulnerability Affecting NAS Devices
- Google Ads Spread the Word: Researchers expose Mars Stealer Malware Campaign
- Honda’s Keyless Access Bug Could Let Thieves Remotely Unlock and Start Vehicles
- Improve Your Hacking Skills with 9 Python Courses for Just $39
- LAPSUS$ Claims to Have Breached IT Firm Globant; Leaks 70GB of Data
- CISA Warns of Ongoing Cyber Attacks Targeting Internet-Connected UPS Devices
- Critical SonicOS Vulnerability Affects SonicWall Firewall Appliances
- New Hacking Campaign by Transparent Tribe Hackers Targeting Indian Officials
- Privid: A Privacy-Preserving Surveillance Video Analytics System
- Critical Sophos Firewall RCE Vulnerability Under Active Exploitation
- New Malware Loader ‘Verblecon’ Infects Hacked PCs with Cryptocurrency Miners
- Experts Detail Virtual Machine Used by Wslink Malware Loader for Obfuscation
- A Large-Scale Supply Chain Attack Distributed Over 800 Malicious NPM Packages
- New Report on Okta Hack Reveals the Entire Episode LAPSUS$ Attack
- Hackers Hijack Email Reply Chains on Unpatched Exchange Servers to Spread Malware
- Of Cybercriminals & IP addresses
- FCC Adds Kaspersky and Chinese Telecom Firms to National Security Threat List
- Recent Malware Attacks Showed a New FatalRAT Variant Used by ‘Purple Fox Hackers’
- Muhstik Botnet Targeting Redis Servers Using Recently Disclosed Vulnerability
- Another Chinese Hacking Group Spotted Targeting Ukraine Amid Russia Invasion
- Google issues an urgent Chrome update to patch an active exploited zero-day vulnerability
- U.S. Charges 4 Russian Govt. U.S. Charges 4 Russian Govt.
- 7 Suspected Members of LAPSUS$ Hacker Gang, Aged 16 to 21, Arrested in U.K.
- Experts Uncover Campaign Stealing Cryptocurrency from Android and iPhone Users
- North Korean hackers exploited Chrome Zero-Day for Fintech, IT and Media Firms
- 23-Year-Old Russian Hacker Wanted by FBI for Running Marketplace of Stolen Logins
- Chinese APT Hackers Attack Betting Companies in Southeast Asia
- How to Build a Custom Malware Analysis Sandbox
- Researchers Trace LAPSUS$ Cyber Attacks to 16-Year-Old Hacker from England
- Over 200 Malicious NPM Packages Caught Targeting Azure Developers
- VMware Issues Patches for Critical Flaws Affecting Carbon Black App Control
- Chinese ‘Mustang Panda’ Hackers Spotted Deploying New ‘Hodur’ Malware
- To evaluate XDR solutions effectively, use this Definitive RFP template
- New Variant of Chinese Gimmick Malware Targeting macOS Users
- Over 200,000 MicroTik Routers Worldwide Are Under the Control of Botnet Malware
- Microsoft and Okta confirm breach by the LAPSUS$ Extortion group
- Lapsus$ Hackers Claim to Have Breached Microsoft and Authentication Firm Okta
- Wazuh Offers XDR Functionality at a Price Enterprises Will Love — Free!
- U.S. Government warns companies about potential Russian cyberattacks
- Inspiron Vostro, XPS and Alienware Systems are affected by new Dell BIOS bugs
- A New Browser-in the Browser Attack (BITB), Makes Phishing Nearly Undetectable
- French Entities Targeted by a New Backdoor via an Open-Source Package Installer
- ‘CryptoRom’ Crypto Scam Abusing iPhone Features to Target Mobile Users
- South Korean DarkHotel Hackers Targeted Luxury Hotels in Macau
- Hackers Target Bank Networks with new Rootkit to Steal Money from ATM Machines
- Experts Find Some Affiliates of BlackMatter Now Spreading BlackCat Ransomware
- Google Uncovers ‘Initial Access Broker’ Working with Conti Ransomware Gang
- Russian Cyclops Botnet Launches New Version
- Popular NPM Package Updated to Wipe Russia, Belarus Systems to Protest Ukraine Invasion
- The DirtyMoe botnet gains new opportunities in the Wormable Module, spreading rapidly
- The Golden Hour of Incident Response
- TrickBot Malware Abusing MikroTik Routers as Proxies for Command-and-Control
- Ukraine Secret Service Arrests Hacker Helping Russian Invaders
- New Vulnerability in CRI-O Engine Lets Attackers Escape Kubernetes Containers
- New “B1txor20” Linux Botnet Uses DNS Tunnel and Exploits Log4J Flaw
- New Infinite Loop Bug in OpenSSL Could Let Attackers Crash Remote Servers
- FBI, CISA Warn of Russian Hackers Exploiting MFA and PrintNightmare Bug
- Unpatched RCE Bug in dompdf Project Affects HTML to PDF Converters
- Build Your 2022 Cybersecurity Plan With This Free PPT Template
- German Government Warns Against Using Russia’s Kaspersky Antivirus Software
- Multiple Flaws Uncovered in ClickHouse OLAP Database System for Big Data
- Facebook Hit With $18. 6 Million GDPR Fine Over 12 Data Breaches in 2018
- CaddyWiper: Yet Another Data Wiping Malware Targeting Ukrainian Networks
- Nearly 34 Ransomware Variants Observed in Hundreds of Cyberattacks in Q4 2021
- Massive DDoS Attack Knocked Israeli Government Websites Offline
- ‘Dirty Pipe’ Linux Flaw Affects a Wide Range of QNAP NAS Devices
- Gaming Company Ubisoft Confirms It was Hacked, Resets Staff Passwords
- Why Enterprise Threat Mitigation Requires Automated, Single-Purpose Tools
- Russian Ransomware Gang Retools Custom Hacking Tools for Other APT Groups
- Netfilter Firewall Module: New Linux bug allows attackers root access
- Researchers Find New Evidence Linking Kwampirs Malware to Shamoon APT Hackers
- Multiple Security Flaws Discovered in Popular Software Package Managers
- Russian Pushing New State-run TLS Certificate Authority to Deal With Sanctions
- New Exploit Bypasses Existing Spectre-V2 Mitigations in Intel and Arm CPUs
- Here’s How to Find if WhatsApp Web Code on Your Browser Has Been Hacked
- Iranian Hackers Targeting Turkey and Arabian Peninsula in New Malware Campaign
- Ukrainian Hacker Linked to REvil Ransomware Attacks Extradited to United States
- Emotet Botnet’s Latest Resurgence Spreads to Over 100,000 Computers
- Hackers Abuse Mitel Devices to Amplify DDoS Attacks by 4 Billion Times
- Critical Bugs Could Let Attackers Remotely Hack, Damage APC Smart UPS Devices
- Prepare for Rainy Day with the Incident Response Plan
- Chinese APT41 Hackers Broke into at Least 6 U.S. State Governments: Mandiant
- Critical RCE Bugs Found in Pascom Cloud Phone System Used by Businesses
- Microsoft, Adobe, and other major software firms issue critical security patches
- New 16 High-Severity UEFI Firmware Flaws Discovered in Millions of HP Devices
- Google: Russian Hackers Target Ukrainians, European Allies via Phishing Attacks
- Google Buys Cybersecurity Firm Mandiant for $5. 4 Billion
- Samsung Confirms Data Breach After Hackers Leak Galaxy Source Code
- Critical “Access:7” Supply Chain Vulnerabilities Impact ATMs, Medical and IoT Devices
- Unpatched Security Vulnerabilities – A Persisting Threat
- Researchers Warn of Linux Kernel ‘Dirty Pipe’ Arbitrary File Overwrite Vulnerability
- Microsoft Azure’s ‘AutoWarp’ Bug May Have Led to Attackers Accessing Customers’ Accounts
- Ukrainian CERT warns citizens about Phishing Attacks Using Compromised Accounts
- Critical Bugs in TerraMaster TOS Could Open NAS Devices to Remote Hacking
- Understanding How Hackers Recon
- SharkBot Banking Malware Spreading via Fake Android Antivirus App on Google Play Store
- 2 New Mozilla Firefox 0-Day Bugs Under Active Attack — Patch Your Browser ASAP!
- New Linux Kernel Cgroups Vulnerability Could Let Attackers Escape Container
- Imperva Thwarts 2. 5 Million RPS Ransom DDoS Extortion Attacks
- CISA Adds Another 95 Flaws to its Actively Exploited Vulnerabilities Catalog
- Both Sides in Russia-Ukraine War Heavily Using Telegram for Disinformation and Hacktivism
- New Security Vulnerability Affects Thousands of GitLab Instances
- Russia Releases List of IPs, Domains Attacking Its Infrastructure with DDoS Attacks
- Researchers Demonstrate New Side-Channel Attack on Homomorphic Encryption
- Critical Patches Issued for Cisco Expressway Series, TelePresence VCS Products
- How to Automate Offboarding to Keep Your Company Safe
- Hackers Who Broke Into NVIDIA’s Network Leak DLSS Source Code Online
- Report: Nearly 75% of Infusion Pumps Affected by Severe Vulnerabilities
- U.S Senate Passes Cybersecurity Bill to Strengthen Critical Infrastructure Security
- Hackers Try to Hack European Officials to Get Info on Ukrainian Refugees, Supplies
- Hackers Begin Weaponizing TCP Middlebox Reflection for Amplified DDoS Attacks
- LIVE Webinar: What can we expect in 2022?
- Critical Security Bugs Uncovered in VoIPmonitor Monitoring Software
- TeaBot Android Banking Malware Spreads Again Through Google Play Store Apps
- Critical Bugs Reported in Popular Open Source PJSIP SIP and Media Stack
- Conti Ransomware Gang’s Internal Chats Go Online after Siding with Russia
- Second New ‘IsaacWiper’ Data Wiper Targets Ukraine After Russian Invasion
- Break into Ethical Hacking with 18 Advanced Online Courses for Just $42. 99
- Trickbot Malware Gang upgrades its AnchorDNS backdoor to AnchorMail
- Microsoft Finds FoxBlade Malware Hit Ukraine Hours Before Russian Invasion
- China-linked Daxin Malware Targeted Multiple Governments in Espionage Attacks
- CISA has added the recently discovered Zimbra bug in its Exploited Vulnerabilities Catalog
- 100 Million Samsung Galaxy Phones Affected with Flawed Hardware Encryption Feature
- CISA warns about high-severity flaws in Schneider’s SCADA Software by GE Digital
- Reborn of Emotet: New Features of the Botnet and How to Detect it
- Iranian Hackers Using New Spying Malware That Abuses Telegram Messenger API
- Experts create an Apple AirTag Clone that can bypass anti-tracking measures
- Gamers Spread Malware Through Social Media Hacking on Microsoft Store
- Russia-Ukraine War : Hacker, Malware, and Phishing Groups Take Sides
- U.S. Defense Contractors Targeted by New SockDetour Fileless and Socketless Backdoor
- Iran’s MuddyWater Hacker Group Using New Malware in Worldwide Cyber Attacks
- Putin Warns Russian Critical Infrastructure to Brace for Potential Cyber Attacks
- The Botnet Infrastructure Shuts down by the Notorious Trickbot Malware Gang
- New Flaws Discovered in Cisco’s Network Operating System for Switches
- TrickBot Gang Likely Switches Operations to New Malware
- The Data Center: What happened to Pet Systems and Cattle Farm?
- Warning — Deadbolt Ransomware Targeting ASUSTOR NAS Devices
- CISA Alerts on Zabbix Network Monitoring Platform Actively Exploited Flaws
- US and UK Agencies Alerted to New Russian Botnet Using Hacked Firewall Devices
- New Wiper Malware Targeting Ukraine Amid Russia’s Military Operation
- Dridex Malware Deploying Entropy Ransomware on Hacked Computers
- Chinese Experts Uncover Details of Equation Group’s Bvp47 Covert Hacking Tool
- 9-Year-Old Unpatched Email Hacking Bug Uncovered in Horde Webmail Software
- 25 Malicious JavaScript Libraries Distributed via Official NPM Package Repository
- Hackers Stole $1. 7 Million Worth of NFTs from Users of OpenSea Marketplace
- Chinese hackers target Taiwan’s financial trading sector with a supply chain attack
- Hackers Unpatched Microsoft SQL Database Servers With Cobalt Strike
- New Android Banking Trojan Spreading via Google Play Store Targets Europeans
- Iranian State Broadcaster IRIB Hits by Destructive Wiper Malware
- A Free Solution to Protect Your Business from 6 Biggest Cyber Threats in 2022
- Hackers Exploit Bug in SMS Verification Services to Infect Android Devices
- Master Key for Hive Ransomware Retrieved Using a Flaw in its Encryption Algorithm
- Justice Department appoints the first Director for National Cryptocurrency Enforcement Team
- U.S. Cybersecurity Agency Publishes List of Free Security Tools and Services
- Critical Flaw Uncovered in WordPress Backup Plugin Used by Over 3 Million Sites
- CryptBot targets Koreans with pseudoManuscrypt malware
- Microsoft Warns of ‘Ice Phishing’ Threat on Web3 and Decentralized Networks
- Snap Package Manager Uncovers New Linux Privilege Escalation Flaw
- Iranian Hackers Targeting VMware Horizon Log4j Flaws to Deploy Ransomware
- 4 Cloud Data Security Best Practices All Businesses Should Follow Today
- Attackers Can Crash Cisco Email Security Appliances by Sending Malicious Emails
- Another Critical RCE Discovered in Adobe Commerce and Magento Platforms
- Getting Your SOC 2 Compliance as a SaaS Company
- Google Bringing Privacy Sandbox to Android to Limit Sharing of User Data
- This New Tool Can Retrieve Pixelated Text from Redacted Documents
- Researchers warn of new Golang-based botnet under continuous development
- Moses Staff Hackers Attack Israeli Organizations For Cyber Espionage
- U.S. Says Russian Hackers Stealing Sensitive Data from Defense Contractors
- [Webinar] When More Is Not Better: Solving Alert Overload
- Trickbot Malware Targeted Customers of 60 High-Profile Companies Since 2020
- VMware issues security patches for high-severity flaws that affect multiple products
- EU Data Protection Watchdog calls for a ban on Pegasus-like commercial spyware
- Apache Cassandra Database Software: High-Severity RCE Security Problem Reported
- Facebook Agrees to Pay $90 Million to Settle Decade-Old Privacy Violation Case
- ShadowPad Malware Attacks and Chinese Ministry are linked by Researchers
- SecureDNS Cloud-based Internet Security and Web Filtering for MSPs
- Experts warn of hacking group targeting aviation and defense sectors
- New MyloBot Malware Variant Sends Sextortion Emails Demanding $2,732 in Bitcoin
- New Chrome 0-Day Bug Under Active Attack – Update Your Browser ASAP!
- Spanish Police Arrest SIM Swappers Who Stole Money from Victims Bank Accounts
- Moxa MXview Network Management Software: Critical Security Issues Reported
- Important Magento 0-Day Vulnerability under Active Exploitation — Patch Published
- Cybercriminals Created Fake Digital Evidence for Indian Lawyers and Activists
- France Rules That Using Google Analytics Violates GDPR Data Protection Law
- Apple Releases iOS, iPadOS, macOS Updates to Patch Actively Exploited Zero-Day Flaw
- FritzFrog P2P Botnet Attacking Healthcare, Education and Government Sectors
- COVID does not spread to computers
- CISA, FBI and NSA issue advisory on serious increase in ransomware attacks
- Russia Cracks Down on 4 Dark Web Marketplaces for Stolen Credit Cards
- Critical flaws in PHP Everywhere’ Plugin could affect thousands of WordPress sites
- U.S. Arrests Two and Seizes $3. 6 Million in Cryptocurrency Stolen in 2016 Bitfinex Hack
- Guide: Alert Overload and Handling for Lean IT Security Teams
- Iranian Hackers Using New Marlin Backdoor in ‘Out to Sea’ Espionage Campaign
- Russian APT Hackers Used COVID-19 Lures to Target European Diplomats
- Microsoft and Other Major Software Firms Release February 2022 Patch Updates
- In recent attacks, Palestinian hackers used a new NimbleMamba implant
- Many Malware families use Pay-Per Install Service to expand their targets
- ‘Roaming Mantis’ Android Malware Targeting Europeans via Smishing Campaigns
- Medusa Android Banking Trojan Spreading Through Flubot’s Attacks Network
- The Attack Surface Management Strategy to Prevent Cyberattacks
- Microsoft disables Internet Macros for Office Apps in Default to Protect From Malware Attacks
- Microsoft Temporarily Disables MSIX App Installers to Prevent Malware Abuse
- Indian Military Personnel and Government are the targets of new CapraRAT Android Malware
- Hackers Backdoored Systems at China’s National Games Just Before Competition
- Security Auditing for Corporate Networks: IoT/connected Device Discovery and Security Auditing
- Chinese Hackers Target Taiwanese Financial Institutions with a new Stealthy Backdoor
- CISA Orders Federal Agencies to Patch Actively Exploited Windows Vulnerability
- New Argo CD Bug Could Let Hackers Steal Secret Info from Kubernetes Apps
- QuaDream, another Israeli firm, was caught using the iPhone bug to spyware
- Microsoft Uncovers New Details of Russian Hacking Campaign Targeting Ukraine
- US Authorities Charge 6 Indian Call Centers Scamming Thousands of Americans
- Russian Gamaredon Hackers Targeted ‘Western Government Entity’ in Ukraine
- Cynet Log4Shell Webinar: A Thorough – And Clear – Explanation
- CISA Warns of Critical Vulnerabilities Discovered in Airspan Networks Mimosa
- Hackers exploited a 0-Day vulnerability in Zimbra Email Platform for Spying on Users
- Critical Flaws Discovered in Cisco Small Business RV Series Routers
- A new SEO poisoning campaign distributes Trojanized versions of popular software
- How SSPM Simplifies Your SOC2 SaaS Security Posture Audit
- New Variant of UpdateAgent Malware Infects Mac Computers with Adware
- A new wave of cyber attacks targets Palestine using political bait and malware
- SolarWinds Malware Attackers Use New Malware for years Undiscovered
- Cynet’s Keys to Extend Threat Visibility
- Dozens of Security Flaws Discovered in UEFI Firmware Used by Several Vendors
- Hacker Group ‘Moses Staff’ Using New StrifeWater RAT in Ransomware Attacks
- WordPress Plugin For Elementor With More Than a Million Installs: Critical bug discovered
- Solarmarker Malware Uses Novel Techniques to Persist on Hacked Systems
- Iranian Hackers Using New PowerShell Backdoor in Cyber Espionage Attacks
- Ukraine continues to face cyber-espionage attacks from Russian hackers
- Researchers Uncover New Iranian Hacking Campaign Targeting Turkish Users
- Reasons Why Every Business is a Target of DDoS Attacks
- Existing SureMDM vulnerabilities could expose companies to supply chain attacks
- Behind The Buzzword: Four Ways to Assess Your Zero Trust Security Posture
- New Samba Bug Allows Remote Attackers to Execute Arbitrary Code as Root
- Your Graphics Card Fingerprint Can Be Used to Track Your Activities Across the Web
- Researchers use natural silk fibers to create strong authentication keys.
- German Court Rules Web Sites Embed Google Fonts Violates GDPR
- Apple Pays $100,500 Bounty to Hacker Who Found Way to Hack MacBook Webcam
- DeepDotWeb News Site Operator Sentenced to 8 Years for Money Laundering
- Hackers Using Device Registration Trick to Attack Enterprises with Lateral Phishing
- How Wazuh Can Improve Digital Security for Businesses
- North Korean hackers use Windows Update Service to infect computers with malware
- North Korean Hackers Return with Stealthier Variant of KONNI RAT Malware
- QNAP Warns of DeadBolt Ransomware Targeting Internet-Facing NAS Devices
- Microsoft Mitigated Record-Breaking 3. 47 Tbps DDoS Attack on Azure Customers
- Patching the CentOS 8 Encryption Bug is Urgent – What Are Your Plans?
- Chaes Banking Trojan Hacks Chrome Browser With Malicious Extensions
- FluBot/Tebot Malware campaigns targeting Android devices are widespread
- Hackers Using New Evasive Technique to Deliver AsyncRAT Malware
- Apple Issues iOS and macOS Software Updates To Patch Actively Exploited Zero-Day Vulnerability
- Webinar: How can you see more, but respond less with enhanced threat visibility?
- Initial Access Broker Involved in Log4Shell Attacks Against VMware Horizon Servers
- Google drops FLoC, and introduces the Topics API. This will replace tracking cookies for ads.
- 12-Year-Old Polkit Flaw Lets Unprivileged Linux Users Gain Root Access
- Hackers exploited MSHTML flaw to spy on government and defense targets
- Hackers infect macOS using a new DazzleSpy backdoor for Watering-Hole Attacks
- TrickBot Malware Using New Techniques to Evade Web Injection Attacks
- Mobile Banking Trojan BRATA Gains New, Dangerous Capabilities
- Hackers Using New Malware Packer DTPacker to Avoid Analysis, Detection
- ZTNAs Address Requirements VPNs Cannot. Here’s Why.
- Hackers Creating Fraudulent Crypto Tokens as Part of ‘Rug Pull’ Scams
- Emotet now uses unconventional IP address formats to avoid detection
- High-Severity Rust Programming Bug Could Lead to File, Directory Deletion
- Experts Find Strategic Similarities b/w NotPetya and WhisperGate Attacks on Ukraine
- Hidden Espionage Attacks by Molerats Hackers Behind Public Cloud Infrastructure
- Control Web Panel: Critical bugs expose Linux servers to RCE attacks
- Hackers Created a Secret Backdoor for Dozens Of WordPress Plugins and WordPress Themes
- Chinese hackers found using a new UEFI Firmware Implant for targeted attacks
- U.S. Sanctions 4 Ukrainians for Working with Russia to Destabilize Ukraine
- Cisco Issues Patch for Critical RCE Vulnerability in RCM for StarOS Software
- Google Details Two Zero-Day Bugs Reported in Zoom Clients and MMR Servers
- Interpol Busted 11 Members of Nigerian BEC Cybercrime Gang
- An Analyse of Leak Sites and a Trip to the Dark Site
- DoNot Hacking Team Targeting Government and Military Entities in South Asia
- New BHUNT Password Stealer Malware Targeting Cryptocurrency Wallets
- Microsoft: Hackers Exploiting New SolarWinds Serv-U Bug Related to Log4j Attacks
- Cyber Threat Protection — It All Starts with Visibility
- Russian Hackers Heavily Using Malicious Traffic Direction System to Distribute Malware
- FIN8 Hackers Spotted Using New ‘White Rabbit’ Ransomware in Recent Attacks
- DDoS IRC Bot Malware Spreading Through Korean WebHard Platforms
- Ukraine: Cyberattacks in Ukraine Part of a Wider Plan to Attack Critical Infrastructure
- Don’t Use Public Wi-Fi Without DNS Filtering
- Researchers Bypass SMS-based Multi-Factor Authentication Protecting Box Accounts
- Europol shuts down VPNLab, Cybercriminals’ Favorite VPN Service
- High-Severity Vulnerability in 3 WordPress Plugins Affected 84,000 Websites
- Dark Web’s largest marketplace for stolen credit cards is closing
- Zoho releases a patch for the critical flaw in ManageEngine Central
- Earth Lusca Hackers Target High-Value Targets in the Government and Private Sectors
- Chrome Limits Websites’ Direct Access to Private Networks for Security Reasons
- The Ukrainian government accuses Russia of recent cyberattacks
- Attack on the Ukrainian Government and Business Entities: A new destructive malware
- New Unpatched Apple Safari Browser Bug Allows Cross-Site User Tracking
- Russia arrests REvil Ransomware Gang for Cyberattacks of High-Profile and Seriousness
- Get Lifetime Access to Cybersecurity Certification Prep Courses
- North Korean hackers stole millions from cryptocurrency startups worldwide
- Huge cyber attack knocks down websites of the Ukrainian government
- Husband-Wife Arrested in Ukraine for Ransomware Attacks on Foreign Companies
- Iranian Hackers Exploit Log4j Vulnerability to Deploy PowerShell Backdoor
- U.K. Hacker Jailed for Spying on Children and Downloading Indecent Images
- Cisco Issues a Patch to Fix a Critical Bug in Unified CCMMP and Unified CDM
- GootLoader Hackers Targeting Employees of Law and Accounting Firms
- Researchers Unlock Qakbot Banking Trojan’s Secret Registry Keys
- TuxCare meets all compliance requirements for patching.
- US Cyber Command Links ‘MuddyWater’ Hacking Group to Iranian Intelligence
- Apple releases iPhone and iPad updates to patch HomeKit DoS vulnerability
- Hackers Use Cloud Services to Distribute Nanocore, Netwire, and AsyncRAT Malware
Pages