MonoX security breach was caused by a bug in smart contracts meanwhile Badger is still investigating the incident. Two DeFi projects BadgerDAO...
Ascendex has lost $77 million worth of RC20, BSC, and Polygon tokens to cyberattack. A popular cryptocurrency exchange, Ascendex has become the...
Malicious actors are deploying a previously undiscovered binary, an Internet Information Services (IIS) webserver module dubbed “Owowa,” on Microsoft Exchange Outlook Web...
If exploited, an unauthenticated, remote attacker can execute code as a “nobody user” in the device meaning attacker would get root access...
The Unit’s boss Gen. Paul Nakasone said that the US military computer operatives are ready to target ransomware gangs and state actors,...
Kali Linux 2021.4 comes with several improved features, including Samba compatibility, better Apple M1 support, switching package manager mirrors – Download Kali...
According to Planned Parenthood, the latest data breach has affected its Los Angeles branch (PPLA) after it suffered a ransomware attack. On...
So far, the Conti ransomware has not demanded any ransom or published any details of the ransomware attack on their official website....
The U.S. is on track to break the single-year data breach record in 2021, according to the Identity Theft Resource Center (ITRC)....
DNA Diagnostics Center (DDC) has revealed that hackers managed to access highly sensitive and personal data of users including payment card data....
GoDaddy detected unauthorized access to its systems where it hosts and manages its customers’ WordPress servers. The Scottsdale, Arizona-based web registrar and...
According to Mahan Air, the cyberattack was launched on Sunday morning and its responsibility was later claimed by a relatively lesser-known hacking...
Russian cybercrime and hacking forums are opening doors to Chinese and English-speaking threat actors, which so far had been a relatively restricted...
Robinhood data breach involved social engineering attack in which hackers called a customer service staff member and somehow gained access to the...
The FBI acknowledged the unauthorized access over the weekend revealing that spam emails were sent from the agency’s email server to thousands...
The malware is currently targeting Linux-embedded routers and IoT devices through botnets. The IT security researchers at AT&T Alien Labs have tracked...
Exploiting these vulnerabilities, a remote attacker could also execute arbitrary code on the server using root-user privileges. The cybersecurity researchers at Positive...
The ProxyShell vulnerabilities have prompted threat actors to launch domain-wide ransomware attacks against their targets, revealed a new research report from The...
The vulnerability can be exploited by attackers with physical access to the CPU to breach the security protocols and obtain sensitive information....
Newer AI algorithms are extremely good at analyzing data traffic, access, and transfer, as well as detecting outliers or anomalies in data...
Lazarus, the North Korea-affiliated state-sponsored group, is attempting to once again target security researchers with backdoors and remote access trojans using a...