The security researchers of Cybereason Nocturnus have recently detected three malicious cyber-espionage campaigns that are targeting the major telecommunication companies all over...
A group of researchers discovered three different groups of threat actors linked to the Chinese government using previously seen Microsoft Exchange exploits...
A story of how easily hackers could hit a hole-in-one with the computer network of a premier golf club in the UK.
Security experts at SentinelOne have come across a previously unidentified data-scrubbing malware tool that was a portion of an uncontrollable malware attack...
Pentesting has become one of the main practices of the cybersecurity community and even represents an important source of income for independent...
The operators of the REvil ransomware, one of the most dangerous hacking groups in the world, have deployed a massive new operation....
An ongoing brute-force attack campaign targeting enterprise cloud environments has been spearheaded by the Russian military intelligence since mid-2019, according to a...
Cybersecurity researchers are warning of ongoing attacks coordinated by a suspected Chinese-speaking threat actor targeting the Afghanistan government as part of an...
A new cybercriminal campaign is hitting the streets of Sao Paulo, Brazil, with a group dedicated to stealing iPhone devices in order...
A recent hacking campaign targeting digital artists and creators of non-funible tokens (NFT) led to the theft of sensitive information and an...
A newly discovered hacking group is deploying an ambitious malicious campaign against politicians in Africa and the Middle East. The operation, identified...
The Federal Bureau of Investigation (FBI), in collaboration with the Australian Federal Police announced the end of Operation Ironside or Trojan Shield,...
A North Korean threat actor active since 2012 has been behind a new espionage campaign targeting high-profile government officials associated with its...
Pentesting is one of the most important processes in cybersecurity, as it allows a correct analysis of internal vulnerabilities to determine the...
Attacks on ATMs on the street have evolved in great steps, leaving behind the methods of physical engagement of these machines to...
Cybersecurity specialists report detecting a new wave of attacks potentially linked to the Avaddon ransomware variant. This is a strain detected in...
The cybersecurity researchers of FireEye’s cybersecurity team at Mandiant have recently proclaimed that the phishing campaign, which mopped across financial, communications, medical,...
The adoption of Voice over Internet Protocol (VoIP) technology is becoming broader, allowing organizations to communicate over huge distances and very easily....
Moxie Marlinspike, CEO of Signal states that since Cellebrite itself makes a living from undisclosed vulnerabilities, he decided to disclose the vulnerability...
More than 20 million BigBasket users’ data were recently leaked on a well-known hacking forum known as “ShinyHunter” It’s a popular online...
A recent security report mentions that a dark web leak containing access keys has been published to more than 1.3 million Windows...