A new zero-day vulnerability has been found by Google’s Threat Analysis Group (TAG), and it is being actively exploited by hackers who...
The Vice Society cybercrime group has disproportionately targeted educational institutions, accounting for 33 victims in 2022 and surpassing other ransomware families like...
CryWiper, a previously unknown data wiper that masquerades as ransomware, has been recently discovered and is spreading around the internet. Furthermore, this...
Research carried out by security analysts at CRIL (Cyble Research and Intelligence Labs) recently identified several ransomware groups that are actively targeting...
A novel Go-based botnet called Zerobot has been observed in the wild proliferating by taking advantage of nearly two dozen security vulnerabilities...
Customers have been alerted by Sophos that many vulnerabilities, including ones that may lead to arbitrary code execution, have been patched in...
Rackspace, a provider of cloud computing services, has admitted that it was the victim of a ransomware incident, which resulted in the...
Kubernetes Deployment on AWS Kubernetes is open-source software for deploying and managing containerized applications at scale. Kubernetes can manage clusters on Amazon...
Cybersecurity researchers have shed light on a darknet marketplace called InTheBox that’s designed to specifically cater to mobile malware operators. The actor...
Ransomware attacks keep increasing in volume and impact largely due to organizations’ weak security controls. Mid-market companies are targeted as they possess...
A persistent intrusion campaign has set its eyes on telecommunications and business process outsourcing (BPO) companies at lease since June 2022. “The...
A version of an open source ransomware toolkit called Cryptonite has been observed in the wild with wiper capabilities due to its...
The cybersecurity company Kaspersky Labs has found “pinpoint” cyberattacks in Russia, and they have given files that are infected with a new...
A free operating system that is similar to Unix and Berkeley Unix is called FreeBSD. It is derived from Research Unix via...
A new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor’s offices and courts. “Although it disguises...
Cybersecurity researchers have discovered a security vulnerability that exposes cars from Honda, Nissan, Infiniti, and Acura to remote attacks through a connected...
The maintainers of the FreeBSD operating system have released updates to remediate a security vulnerability impacting the ping module that could be...
The mobile security firm Zimperium has recently issued a warning about a Trojan called “Schoolyard Bully,” which is actively masquerading as an...
Because companies either do not teach their staff enough or have inadequate email security measures in place, many firms, ranging from start-ups to...
Recently, Mandiant Managed Defense discovered cyber espionage activity that focuses on the Philippines and mainly uses USB drives as an initial infection...
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
SolarWinds Serv-U Vulnerability Under Active Attack – Patch Immediately
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Chinese Cyber Espionage Targets Telecom Operators in Asia Since 2021
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
New Threat Actor ‘Void Arachne’ Targets Chinese Users with Malicious VPN Installers
Warning: Markopolo’s Scam Targeting Crypto Users via Fake Meeting Software
Mailcow Mail Server Flaws Expose Servers to Remote Code Execution
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
New Malware Targets Exposed Docker APIs for Cryptocurrency Mining
VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi
ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
China-Linked Hackers Infiltrate East Asian Firm for 3 Years Using F5 Devices
Hackers Exploit Legitimate Websites to Deliver BadSpace Windows Backdoor
NiceRAT Malware Targets South Korean Users via Cracked Software
Grandoreiro Banking Trojan Hits Brazil as Smishing Scams Surge in Pakistan
Pakistani Hackers Use DISGOMOJI Malware in Indian Government Cyber Attacks