A growing number of threat actors are using the ongoing Russo-Ukrainian war as a lure in various phishing and malware campaigns, even...
Prevention is always recommended when it comes to ransomware infections. Nevertheless, there are numerous ways to recover lost data whenever a device...
A report by Trend Micro details the detection of various samples of the AvosLocker ransomware capable of using legitimate files to disable...
Five critical remote code execution (RCE) vulnerabilities have been confirmed to be found in millions of Aruba and Avaya devices whose exploitation...
The Narcotics and Economic Crimes Investigations (NECI) Task Force, a specialized unit of California police, has expanded its list of names of...
Cybersecurity researchers have detailed as many as five severe security flaws in the implementation of TLS protocol in several models of Aruba...
An analysis of four months of chat logs spanning more than 40 conversations between the operators of Conti and Hive ransomware and...
Cybersecurity researchers have disclosed a new variant of the AvosLocker ransomware that disables antivirus solutions to evade detection after breaching target networks...
A Chinese-aligned cyberespionage group has been observed striking the telecommunication sector in Central Asia with versions of malware such as ShadowPad and...
A newly discovered suspected espionage threat actor has been targeting employees focusing on mergers and acquisitions as well as large corporate transactions...
Google has decided to temporarily increase payments in its vulnerability bounty program for those researchers who submit reports of flaws in Android...
The U.S. Department of Justice (DOJ) announced that Sercan Oyuntur, a 40-year-old Californian citizen, was convicted of six counts related to a...
A Chinese state-sponsored espionage group known as Override Panda has resurfaced in recent weeks with a new phishing attack with the goal...
According to folklore, witches were able to sail in a sieve, a strainer with holes in the bottom. Unfortunately, witches don’t work...
A prototype version of the Package Analysis tool has been recently released by the Open Source Security Foundation (OpenSSF), and it is...
A Russian state-sponsored threat actor has been observed targeting diplomatic and government entities as part of a series of phishing campaigns commencing...
A couple of months ago Ubuntu and Debian officials published security advisories related to CVE-2022-0543, a vulnerability derived from a bug in...
Several manufacturers of network-attached storage (NAS) solutions have alerted their customers to the detection of critical vulnerabilities in Netatalk. The exploitation of...
At least six different Russia-aligned actors launched no less than 237 cyberattacks against Ukraine from February 23 to April 8, including 38...
India’s computer and emergency response team, CERT-In, on Thursday published new guidelines that require service providers, intermediaries, data centers, and government entities...
North Korean Hackers Target Brazilian Fintech with Sophisticated Phishing Tactics
New Attack Technique ‘Sleepy Pickle’ Targets Machine Learning Models
Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware
Pakistan-linked Malware Campaign Evolves to Target Windows, Android, and macOS
Google Warns of Pixel Firmware Security Flaw Exploited as Zero-Day
New Cross-Platform Malware ‘Noodle RAT’ Targets Windows and Linux Systems
Cryptojacking Campaign Targets Misconfigured Kubernetes Clusters
Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw
New Phishing Campaign Deploys WARMCOOKIE Backdoor Targeting Job Seekers
China-Backed Hackers Exploit Fortinet Flaw, Infecting 20,000 Systems Globally
Microsoft Issues Patches for 51 Flaws, Including Critical MSMQ Vulnerability
Chinese Actor SecShow Conducts Massive DNS Probing on Global Scale
China-Linked ValleyRAT Malware Resurfaces with Advanced Data Theft Tactics
Snowflake Breach Exposes 165 Customers’ Data in Ongoing Extortion Campaign
Sticky Werewolf Expands Cyber Attack Targets in Russia and Belarus
New PHP Vulnerability Exposes Windows Servers to Remote Code Execution
Microsoft Revamps Controversial AI-Powered Recall Feature Amid Privacy Concerns
Ultimate Cyber Hygiene Guide: Learn How to Simplify Your Security Efforts
LightSpy Spyware’s macOS Variant Found with Advanced Surveillance Capabilities
FBI Distributes 7,000 LockBit Ransomware Decryption Keys to Help Victims