Recently on March 22, 2022, several screenshots from the computer of one of Okta’s third-party support technicians were published online by the...
A web application firewall (WAF) is a program designed to analyze incoming requests to a web server and, according to the rules...
A Russian-speaking ransomware outfit likely targeted an unnamed entity in the gambling and gaming sector in Europe and Central America by repurposing...
A court in Ontario, Canada has sentenced Sebastien Vachon-Desjardins to seven years in prison after pleading guilty to participating as an affiliate...
Having successfully compromised more than 300 Russian websites, Anonymous hackers are offering the Kremlin-sent military 5 million rubles (about $45,000 USD) for...
Spanish authorities announced the arrest of five people accused of hacking a cryptocurrency exchange company, an incident that resulted in the theft...
Researchers from China’s Pangu Lab have disclosed details of a “top-tier” backdoor put to use by the Equation Group, an advanced persistent...
Users of Horde Webmail are being urged to disable a feature to contain a nine-year-old unpatched security vulnerability in the software that...
Entities in the aviation, aerospace, transportation, manufacturing, and defense industries have been targeted by a persistent threat group since at least 2017...
A threat actor with potential links to an Indian cybersecurity company has been nothing if remarkably persistent in its attacks against military...
For almost five years, SecureList researchers reported the identification of an Advanced Persistent Threat (APT) group apparently linked to the infamous Lazarus...
The U.S. Cyber Command (USCYBERCOM) on Wednesday officially confirmed MuddyWater’s ties to the Iranian intelligence apparatus, while simultaneously detailing the various tools...
In a statement, the Strategic Operations Unit of the Delhi Police, India, unveiled the dismantling of a hacking operation dedicated to resolving...
Trojanized installers of the Telegram messaging application are being used to distribute the Windows-based Purple Fox backdoor on compromised systems. That’s according...
In recent days it was revealed the detection of a new attack vector for the successful exploitation of remote code execution (RCE)...
A previously undocumented, financially motivated threat group has been connected to a string of data theft and extortion attacks on over 40...
The Unit’s boss Gen. Paul Nakasone said that the US military computer operatives are ready to target ransomware gangs and state actors,...
At least 300,000 IP addresses associated with MikroTik devices have been found vulnerable to multiple remotely exploitable security vulnerabilities that have since...
Israel’s Ministry of Defense has dramatically restricted the number of countries to which cybersecurity firms in the country are allowed to sell...
Russian cybercrime and hacking forums are opening doors to Chinese and English-speaking threat actors, which so far had been a relatively restricted...
A corporate cyber-espionage hacker group has resurfaced after a seven-month hiatus with new intrusions targeting four companies this year, including one of...