A proof-of-concept (PoC) code demonstrating a newly disclosed digital signature bypass vulnerability in Java...
A “dangerous piece of functionality” has been discovered in Microsoft 365 suite that could...
As part of cyberattacks in protest against the military invasion of Ukraine, the hacktivist...
This weekend, vpnMentor researchers identified in Telegram 4 storage files with a total of...
Cybersecurity researchers have disclosed a new version of the SolarMarker malware that packs in...
A never-before-seen remote access trojan dubbed ZuoRAT has been singling out small office/home office (SOHO) routers as part of a sophisticated campaign...
The latest version of the OpenSSL library has been discovered as susceptible to a remote memory-corruption vulnerability on select systems. The issue...
A previously unknown Android banking trojan has been discovered in the wild, targeting users of the Spanish financial services company BBVA. Said...
The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the U.S., Canada, the U.K., Australia, and New Zealand within...
A malware-as-a-service (Maas) dubbed Matanbuchus has been observed spreading through phishing campaigns, ultimately dropping the Cobalt Strike post-exploitation framework on compromised machines....
Here are some of the most common ways hackers can get hold of other people’s credit card data – and how you can...
A week after it emerged that a sophisticated mobile spyware dubbed Hermit was used by the government of Kazakhstan within its borders,...
A China-based advanced persistent threat (APT) group is possibly deploying short-lived ransomware families as a decoy to cover up the true operational...
A threat cluster with ties to a hacking group called Tropic Trooper has been spotted using a previously undocumented malware coded in...
QNAP, Taiwanese maker of network-attached storage (NAS) devices, on Wednesday said it’s in the process of fixing a critical three-year-old PHP vulnerability...
The Computer Emergency Response Team of Ukraine (CERT-UA) has cautioned of a new set of spear-phishing attacks exploiting the “Follina” flaw in...
Europol on Tuesday announced the dismantling of an organized crime group that dabbled in phishing, fraud, scams, and money laundering activities. The...
The operators behind the Rig Exploit Kit have swapped the Raccoon Stealer malware for the Dridex financial trojan as part of an...
An advanced persistent threat (APT) actor codenamed ToddyCat has been linked to a string of attacks aimed at high-profile entities in Europe...
Ransomware has been a thorn in the side of cybersecurity teams for years. With the move to remote and hybrid work, this...
A 36-year-old former Amazon employee was convicted of wire fraud and computer intrusions in the U.S. for her role in the theft...
Insurance exists to protect the insured party against catastrophe, but the insurer needs protection so that its policies are not abused –...
The operators behind BRATA have once again added more capabilities to the Android mobile malware in an attempt to make their attacks...
Cybersecurity researchers have disclosed details about 15 security flaws in Siemens SINEC network management system (NMS), some of which could be chained...
A recently patched critical security flaw in Atlassian Confluence Server and Data Center products is being actively weaponized in real-world attacks to...
ZuoRAT Malware Hijacking Home-Office Routers to Spy on Targeted Networks
OpenSSL to Release Security Patch for Remote Memory Corruption Vulnerability
New Android Banking Trojan ‘Revive’ Targeting Users of Spanish Financial Services
Cybersecurity Experts Warn of Emerging Threat of “Black Basta” Ransomware
Researchers Warn of ‘Matanbuchus’ Malware Campaign Dropping Cobalt Strike Beacons
5 ways cybercriminals steal credit card details
Google Says ISPs Helped Attackers Infect Targeted Smartphones with Hermit Spyware
State-Backed Hackers Using Ransomware as a Decoy for Cyber Espionage Attacks
Chinese Hackers Distributing SMS Bomber Tool with Malware Hidden Inside
Critical PHP Vulnerability Exposes QNAP NAS Devices to Remote Attacks
Russian Hackers Exploiting Microsoft Follina Vulnerability Against Ukraine
Europol Busts Phishing Gang Responsible for Millions in Losses
RIG Exploit Kit Now Infects Victims’ PCs With Dridex Instead of Raccoon Stealer
New ToddyCat Hacker Group on Experts’ Radar After Targeting MS Exchange Servers
Mitigate Ransomware in a Remote-First World
Former Amazon Employee Found Guilty in 2019 Capital One Data Breach
Do You Have Ransomware Insurance? Look at the Fine Print
BRATA Android Malware Gains Advanced Mobile Threat Capabilities
Over a Dozen Flaws Found in Siemens’ Industrial Network Management System
Atlassian Confluence Flaw Being Used to Deploy Ransomware and Crypto Miners