A “dangerous piece of functionality” has been discovered in Microsoft 365 suite that could...
A newly discovered malware has been put to use in the wild at least...
This weekend, vpnMentor researchers identified in Telegram 4 storage files with a total of...
It has been observed by researchers from Microsoft that credit card skimmers are on...
On Sunday night, rocket sirens sounded for almost an hour in Eilat and in...
Today’s web has made hackers’ tasks remarkably easy. For the most part, hackers don’t even have to hide in the dark recesses...
Web infrastructure company Cloudflare on Tuesday disclosed at least 76 employees and their family members received text messages on their personal and...
Facebook parent company Meta disclosed that it took action against two espionage operations in South Asia that leveraged its social media platforms...
Twitter on Friday revealed that a now-patched zero-day bug was used to link phone numbers and emails to user accounts on the...
A threat actor working to further Iranian goals is said to have been behind a set of damaging cyberattacks against Albanian government...
The U.S. Department of Homeland Security (DHS) has warned of critical security vulnerabilities in Emergency Alert System (EAS) encoder/decoder devices. If left...
A nascent service called Dark Utilities has already attracted 3,000 users for its ability to provide command-and-control (C2) services with the goal...
As many as 29 different router models from DrayTek have been identified as affected by a new critical, unauthenticated remote code execution...
An unknown threat actor has been targeting Russian entities with a newly discovered remote access trojan called Woody RAT for at least...
A threat actor is said to have “highly likely” exploited a security flaw in an outdated Atlassian Confluence server to deploy a...
Threat actors are increasingly mimicking legitimate applications like Skype, Adobe Reader, and VLC Player as a means to abuse trust relationships and...
Researchers have disclosed a new offensive framework referred to as Manjusaka that they call is a “Chinese sibling of Sliver and Cobalt...
Ransomware is a kind of malware used by cybercriminals to stop users from accessing their systems or files; the cybercriminals then threaten...
Hackers are constantly looking for new ways to attack and infect PC users. And, for this, there is nothing better than taking...
A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use by domestic...
The operators of the Gootkit access-as-a-service (AaaS) malware have resurfaced with updated techniques to compromise unsuspecting victims. “In the past, Gootkit used...
Microsoft on Friday disclosed a potential connection between the Raspberry Robin USB-based worm and an infamous Russian cybercrime group tracked as Evil...
A threat actor operating with interests aligned with North Korea has been deploying a malicious extension on Chromium-based web browsers that’s capable...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added the recently disclosed Atlassian security flaw to its Known Exploited Vulnerabilities...
A malicious campaign leveraged seemingly innocuous Android dropper apps on the Google Play Store to compromise users’ devices with banking malware. These...
The Business of Hackers-for-Hire Threat Actors
Hackers Behind Twilio Breach Also Targeted Cloudflare Employees
Meta Cracks Down on Cyber Espionage Operations in South Asia Abusing Facebook
Hackers Exploit Twitter Vulnerability to Exposes 5.4 Million Accounts
Iranian Hackers Likely Behind Disruptive Cyberattacks Against Albanian Government
Emergency Alert System Flaws Could Let Attackers Transmit Fake Messages
A Growing Number of Malware Attacks Leveraging Dark Utilities ‘C2-as-a-Service’
Critical RCE Bug Could Let Hackers Remotely Take Over DrayTek Vigor Routers
New Woody RAT Malware Being Used to Target Russian Organizations
Hackers Exploited Atlassian Confluence Bug to Deploy Ljl Backdoor for Espionage
VirusTotal Reveals Most Impersonated Software in Malware Attacks
Chinese Hackers Using New Manjusaka Hacking Framework Similar to Cobalt Strike
What is ransomware and how can you defend your business from it?
This is how they use Windows Defender antivirus to encrypt your computer with LockBit Ransomware
Australian Hacker Charged with Creating, Selling Spyware to Cyber Criminals
Gootkit Loader Resurfaces with Updated Tactic to Compromise Targeted Computers
Microsoft Links Raspberry Robin USB Worm to Russian Evil Corp Hackers
North Korean Hackers Using Malicious Browser Extension to Spy on Email Accounts
CISA Warns of Atlassian Confluence Hard-Coded Credential Bug Exploited in Attacks
Over a Dozen Android Apps on Google Play Store Caught Dropping Banking Malware