Facebook advertisers in Vietnam are the target of a previously unknown information stealer dubbed VietCredCare at least since August 2022. The malware...
On Thanksgiving Day 2023, while many Americans were celebrating, hospitals across the U.S. were doing quite the opposite. Systems were failing. Ambulances...
VMware is urging users to uninstall the deprecated Enhanced Authentication Plugin (EAP) following the discovery of a critical security flaw. Tracked as...
A novel malware campaign has been observed targeting Redis servers for initial access with the ultimate goal of mining cryptocurrency on compromised...
The U.K. National Crime Agency (NCA) on Tuesday confirmed that it obtained LockBit’s source code as well as a wealth of intelligence...
In the tumultuous landscape of cybersecurity, the year 2023 left an indelible mark with the brazen exploits of the Scattered Spider threat...
ConnectWise has released software updates to address two security flaws in its ScreenConnect remote desktop and access software, including a critical bug...
Hackers backed by Iran and Hezbollah staged cyber attacks designed to undercut public support for the Israel-Hamas war after October 2023. This...
Update: The U.K. National Crime Agency (NCA) has confirmed the takedown of LockBit infrastructure. Read here for more details. An international law...
Meta Platforms said it took a series of steps to curtail malicious activity from eight different firms based in Italy, Spain, and...
The Android banking trojan known as Anatsa has expanded its focus to include Slovakia, Slovenia, and Czechia as part of a new...
Threat actors operating with interests aligned to Belarus and Russia have been linked to a new cyber espionage campaign that likely exploited...
The Iranian-origin threat actor known as Charming Kitten has been linked to a new set of attacks aimed at Middle East policy...
A Ukrainian national has pleaded guilty in the U.S. to his role in two different malware schemes, Zeus and IcedID, between May...
Efficient communication is a cornerstone of business success. Internally, making sure your team communicates seamlessly helps you avoid friction losses, misunderstandings, delays,...
Google has announced that it’s open-sourcing Magika, an artificial intelligence (AI)-powered tool to identify file types, to help defenders accurately detect binary...
Multiple companies operating in the cryptocurrency sector are the target of an ongoing malware campaign that involves a newly discovered Apple macOS...
With breaches making the headlines on an almost weekly basis, the cybersecurity challenges we face are becoming visible not only to large...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has revealed that an unnamed state government organization’s network environment was compromised via an...
The U.S. government on Thursday said it disrupted a botnet comprising hundreds of small office and home office (SOHO) routers in the...
Mysterious Cyber Attack Took Down 600,000+ Routers in the U.S.
Beyond Threat Detection – A Race to Digital Security
Russian Hackers Target Europe with HeadLace Malware and Credential Harvesting
CISA Alerts Federal Agencies to Patch Actively Exploited Linux Kernel Flaw
Cyber Espionage Alert: LilacSquid Targets IT, Energy, and Pharma Sectors
RedTail Crypto-Mining Malware Exploiting Palo Alto Networks Firewall Vulnerability
Europol Shuts Down 100+ Servers Linked to IcedID, TrickBot, and Other Malware
U.S. Dismantles World’s Largest 911 S5 Botnet with 19 Million Infected Devices
Cybercriminals Abuse Stack Overflow to Promote Malicious Python Package
Check Point Warns of Zero-Day Attacks on its VPN Gateway Products
Brazilian Banks Targeted by New AllaKore RAT Variant Called AllaSenha
New Research Warns About Weak Offboarding Management and Insider Risks
Microsoft Uncovers ‘Moonstone Sleet’ — New North Korean Hacker Group
Researchers Warn of CatDDoS Botnet and DNSBomb DDoS Attack Technique
WordPress Plugin Exploited to Steal Credit Card Data from E-commerce Sites
TP-Link Gaming Router Vulnerability Exposes Users to Remote Code Attacks
Moroccan Cybercrime Group Steals Up to $100K Daily Through Gift Card Fraud
Experts Find Flaw in Replicate AI Service Exposing Customers’ Models and Data
Hackers Created Rogue VMs to Evade Detection in Recent MITRE Cyber Attack
Beware: These Fake Antivirus Sites Spreading Android and Windows Malware