Syssphinx (aka FIN8) is a financially motivated cyber-crime group deploying revamped sardonic backdoor to deliver Noberus ransomware. This group has been active since...
Sysdig, a company that specializes in cybersecurity intelligence, uncovered a sophisticated hacking operation known as Scarleteel in February. Since then, Scarleteel has...
An specialist in Russian cybersecurity who was sought by the United States has been arrested by officials in Kazakhstan, according to his...
One of the most popular open-source systems for analytics and visualization, Grafana, was found to have a security flaw.This open-source platform serves...
The ever-changing topography of cyberspace always results in the introduction of new security flaws and vulnerabilities. A major vulnerability, which is now...
According to the findings of recent study conducted, harmful packages may be readily propagated into development environments with the assistance of ChatGPT,...
When a victim visits a website ending in .ZIP, a recently developed phishing method known as “file archiver in the browser” may...
Kimsuky is an advanced persistent threat (APT) organization that originates in North Korea and has a lengthy history of launching targeted attacks...
A major vulnerability with a ranking of 10.0 was discovered in specific universal copy service software that is used in some Illumina...
EvilExtractor is an attack tool that is meant to target Windows operating systems to extract data and files from endpoint devices. EvilExtractor...
A councillor has said that the public e-bikes are being hacked and ridden for free after videos on social media detailing how...
An emerging Python-based credential harvester and a hacking tool named Legion is being marketed via Telegram as a way for threat actors...
The threat actor known as Arid Viper has been observed using refreshed variants of its malware toolkit in its attacks targeting Palestinian...
Samba is a free software project that runs on operating systems that are similar to UNIX and supports the Windows file sharing...
An adversary may circumvent encryption for some communications by exploiting a flaw in the widespread 802.11 protocol, which enables them to do...
The Near-Ultrasound Invisible Trojan, or NUIT, was developed by a team of researchers from the University of Texas at San Antonio and...
Materials research organizations in Asia have been targeted by a previously unknown threat actor using a distinct set of tools. Symantec, by...
The source code of Yandex, the largest IT company in Russia and commonly referred to as the Russian Google, was hacked by...
Cellebrite, an Israeli company that specializes in mobile forensics, seems to have been the victim of yet another data breach, in which...
Twitter on Wednesday said that its investigation found “no evidence” that users’ data sold online was obtained by exploiting any security vulnerabilities...
According to a post on a well-known hacker forum, Volvo Cars has experienced a new data breach, with stolen information allegedly being...