Researchers from Checkpoint found a new and previously unknown ransomware variant dubbed “Rorschach” with highly sophisticated features that target U.S. companies. Rorschach...
Unknown threat actors are actively exploiting a recently patched security vulnerability in the Elementor Pro website builder plugin for WordPress. The flaw,...
Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper malware designed...
The Goose Tool is a new free tool that may assist network defenders in identifying possibly malicious activities in Microsoft Azure, Azure...
Threat actors have been increasingly observed using AI-generated YouTube Videos to spread a variety of stealer malware such as Raccoon, RedLine, and...
Cybersecurity experts at Sophos recently detected multiple malicious 2FA apps in App Store and Google Play that deploy malware. While Twitter made...
The Dutch police announced the arrest of three individuals in connection with a “large-scale” criminal operation involving data theft, extortion, and money...
In what’s a continuing assault on the open source ecosystem, over 15,000 spam packages have flooded the npm repository in an attempt...
Shipping companies and medical laboratories in Asia have been the subject of a suspected espionage campaign carried out by a never-before-seen threat...
Hey 👋 there, cyber friends! Welcome to this week’s cybersecurity newsletter, where we aim to keep you informed and empowered in the...
Telecommunication service providers in the Middle East are being targeted by a previously undocumented threat actor as part of a suspected intelligence...
A new financially motivated campaign that commenced in December 2022 has seen the unidentified threat actor behind it deploying a novel ransomware...
One thing is clear. The “business value” of data continues to grow, making it an organization’s primary piece of intellectual property. From...
A previously unknown threat actor has been targeting companies in the U.S. and Germany with bespoke malware designed to steal confidential information....
After the U.S. Cybersecurity and Infrastructure Security Agency (CISA) released a decryptor for affected victims to recover from ESXiArgs ransomware attacks, the...
As children’s safety and privacy online becomes a matter of increasing urgency, lawmakers around the world push ahead on new regulations in...
GitHub announced that it suffered a security breach in which unauthorized individuals obtained access to specific development and release planning repositories and...
The Russia-affiliated Sandworm used yet another wiper malware strain dubbed NikoWiper as part of an attack that took place in October 2022...
According to reports, a group of hackers has launched a massive cyberattack on Israeli chemical companies operating in the occupied territories. The...
GitHub discovered illegal access to a collection of repositories on December 7, 2022. These repositories were used in the design and development...
Vulnerability analysis results in Orange Cyberdefenses’ Security Navigator show that some vulnerabilities first discovered in 1999 are still found in networks today....