Control Web Panel, which was formerly known as CentOS Web Panel and comes in both free and paid versions, is a web...
Bitdefender, a company that specializes in antivirus software, has now launched a decryptor for the MegaCortex ransomware, which will enable anybody whose...
Microsoft has shed light on four different ransomware families – KeRanger, FileCoder, MacRansom, and EvilQuest – that are known to impact Apple...
Cloud services provider Rackspace on Thursday confirmed that the ransomware gang known as Play was responsible for last month’s breach. The security...
Fortinet, a company that develops next-generation firewalls, VPNs, antivirus, and endpoint solutions, among other products, issued a public security advisory on October...
Internet shutdowns are deliberate disturbances to internet access and digital communications. These disruptions are often carried out by governments in an effort...
A financially motivated threat actor tracked as Blind Eagle has resurfaced with a refined toolset and an elaborate infection chain as part...
Financial institutions are being targeted by a new version of Android malware called SpyNote at least since October 2022 that combines both...
The latest breach announced by LastPass is a major cause for concern to security stakeholders. As often occurs, we are at a...
The notorious information-stealer known as Vidar is continuing to leverage popular social media services such as TikTok, Telegram, Steam, and Mastodon as...
Fortinet has warned of a high-severity flaw affecting multiple versions of FortiADC application delivery controller that could lead to the execution of...
Hackers may have been able to perform malicious activity, such as unlocking, starting, and tracking cars, as well as exposing customers’ personal...
A group of Chinese researchers have just released a paper in which they make the claim that they are capable of breaking...
Ransomware: contemporary threats, how to prevent them and how the FBI can help In April 2021, Dutch supermarkets faced a food shortage....
A new Linux malware developed using the shell script compiler (shc) has been observed deploying a cryptocurrency miner on compromised systems. “It...
After a hacker offered data from more than 200 million Deezer subscribers for sale on a hacking site, the music streaming service...
A new malware campaign has been observed using sensitive information stolen from a bank as a lure in phishing emails to drop...
Financial and insurance sectors in Europe have been targeted by the Raspberry Robin worm, as the malware continues to evolve its post-exploitation...
MITRE ATT&CK reveals the intentions of the attackers to the defenders, which results in a significant reduction in the number of criminals...
In order to resolve two separate cases launched by the states of Indiana and the District of Columbia about the “deceptive” location...
Warning: Hackers Actively Exploiting Zero-Day in Fortra’s GoAnywhere MFT
Iranian OilRig Hackers Using New Backdoor to Exfiltrate Data from Govt. Organizations
Atlassian’s Jira Service Management Found Vulnerable to Critical Vulnerability
New High-Severity Vulnerabilities Discovered in Cisco IOx and F5 BIG-IP Products
New Russian-Backed Gamaredon’s Spyware Variants Targeting Ukrainian Authorities
New Threat: Stealthy HeadCrab Malware Compromised Over 1,200 Redis Servers
Researchers Uncover New Bugs in Popular ImageMagick Image Processing Utility
Experts Warn of ‘Ice Breaker’ Cyberattacks Targeting Gaming and Gambling Industry
Prilex PoS Malware Evolves to Block Contactless Payments to Steal from NFC Cards
Additional Supply Chain Vulnerabilities Uncovered in AMI MegaRAC BMC Software
New Report Reveals NikoWiper Malware That Targeted Ukraine Energy Sector
Researchers Uncover Packer Used by Several Malware to Evade Detection for 6 Years
QNAP Fixes Critical Vulnerability in NAS Devices with Latest Security Updates
Titan Stealer: A New Golang-Based Information Stealer Malware Emerges
Realtek Vulnerability Under Attack: Over 134 Million Attempts to Hack IoT Devices
Gootkit Malware Continues to Evolve with New Components and Obfuscations
Researchers Discover New PlugX Malware Variant Spreading via Removable USB Devices
British Cyber Agency Warns of Russian and Iranian Hackers Targeting Key Industries
Hackers could take control of Lexmark printers or see what you print if you don’t apply this patch
2 Critical vulnerabilities in Argo CD allow complete take over of your Kubernetes