The threat actors behind the BianLian ransomware have been observed exploiting security flaws in JetBrains TeamCity software to conduct their extortion-only attacks....
Technical specifics and a proof-of-concept (PoC) exploit have been made available for a recently disclosed critical security flaw in Progress Software OpenEdge...
A financially motivated threat actor called Magnet Goblin is swiftly adopting one-day security vulnerabilities into its arsenal in order to opportunistically breach...
Microsoft on Friday revealed that the Kremlin-backed threat actor known as Midnight Blizzard (aka APT29 or Cozy Bear) managed to gain access...
In a significant development that could reshape the cybersecurity landscape of industrial control systems (ICS), a team of researchers from the Georgia...
Cisco has released patches to address a high-severity security flaw impacting its Secure Client software that could be exploited by a threat...
Threat actors have been observed leveraging the QEMU open-source hardware emulator as tunneling software during a cyber attack targeting an unnamed “large...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a critical security flaw impacting JetBrains TeamCity On-Premises software to its...
Threat actors are conducting brute-force attacks against WordPress sites by leveraging malicious JavaScript injections, new findings from Sucuri reveal. The attacks, which...
The China-linked threat actor known as Evasive Panda orchestrated both watering hole and supply chain attacks targeting Tibetan users at least since...
In today’s rapidly evolving SaaS environment, the focus is on human users. This is one of the most compromised areas in SaaS...
The U.S. Department of Justice (DoJ) announced the indictment of a 38-year-old Chinese national and a California resident for allegedly stealing proprietary...
Facebook messages are being used by threat actors to distribute a Python-based information stealer dubbed Snake that’s designed to capture credentials and...
Threat actors have been leveraging fake websites advertising popular video conferencing software such as Google Meet, Skype, and Zoom to deliver a...
In the interconnected world of modern software development, Application Programming Interfaces (APIs) play a pivotal role in enabling systems to communicate and...
Threat actors are targeting misconfigured and vulnerable servers running Apache Hadoop YARN, Docker, Atlassian Confluence, and Redis services as part of an...
The threat actors behind the BlackCat ransomware have shut down their darknet website and likely pulled an exit scam after uploading a...
The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and five entities associated with the Intellexa Alliance...
VMware has released patches to address four security flaws impacting ESXi, Workstation, and Fusion, including two critical flaws that could lead to...
The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “TheGhostSec and Stormous ransomware...
U.S. Treasury Hamas Spokesperson for Cyber Influence Operations
Hackers Deploy Python Backdoor in Palo Alto Zero-Day Attack
Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack
U.S. Federal Agencies Ordered to Hunt for Signs of Microsoft Breach and Mitigate Risks
TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
Python’s PyPI Reveals Its Secrets
Fortinet Rolls Out Critical Security Patches for FortiClientLinux Vulnerability
‘eXotic Visit’ Spyware Campaign Targets Android Users in India and Pakistan
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files
Beware: GitHub’s Fake Popularity Scam Tricking Developers into Downloading Malware
Webinar: Learn How to Stop Hackers from Exploiting Hidden Identity Weaknesses
Microsoft Fixes 149 Flaws in Huge April Patch Release, Zero-Days Included
Critical ‘BatBadBut’ Rust Vulnerability Exposes Windows Systems to Attacks
10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet
Hackers Targeting Human Rights Activists in Morocco and Western Sahara
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access
CL0P’s Ransomware Rampage – Security Measures for 2024
Attackers Using Obfuscation Tools to Deliver Multi-Stage Malware via Invoice Phishing
Critical Flaws Leave 92,000 D-Link NAS Devices Vulnerable to Malware Attacks
Watch Out for ‘Latrodectus’ – This Malware Could Be In Your Inbox