Soon after the cyberattack, videos and posts started surfacing on social media displaying messages that read: “Khamenei! Where is our gas?” Another...
Ukraine’s premier law enforcement and counterintelligence agency on Thursday disclosed the real identities of five individuals allegedly involved in digital intrusions attributed...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published a catalog of vulnerabilities, including from Apple, Cisco, Microsoft, and Google, that...
The U.S. government on Thursday announced a $10 million reward for information that may lead to the identification or location of key...
The U.S. Commerce Department on Wednesday added four companies, including Israel-based spyware companies NSO Group and Candiru, to a list of entities...
Cybersecurity researchers disclosed details of what they say is the “largest botnet” observed in the wild in the last six years, infecting...
A Russian national, who was arrested in South Korea last month and extradited to the U.S. on October 20, appeared in a...
The latest cloud security breaches show that we have miles to go as we keep fighting to keep our sensitive data safe. ...
So far, Microsoft has informed 140 companies about the new attack campaign being carried out by Nobelium 14 of which were compromised...
A cyber attack in Iran left petrol stations across the country crippled, disrupting fuel sales and defacing electronic billboards to display messages...
Lazarus Group, the advanced persistent threat (APT) group attributed to the North Korean government, has been observed waging two separate supply chain...
Cybersecurity researchers on Friday disclosed a now-patched critical vulnerability in multiple versions of a time and billing system called BillQuick that’s being...
A new malware campaign targeting Afghanistan and India is exploiting a now-patched, 20-year-old flaw affecting Microsoft Office to deploy an array of...
Apparently, the individuals who received the warning were identified as suspects and will be prosecuted for a cyber offense if they continue...
Automated purple teaming is one of the best ways to address cybercrime as it does not only test for the deficiencies in...
Two Eastern European nationals have been sentenced in the U.S. for offering “bulletproof hosting” services to cybercriminals, who used the technical infrastructure...
A highly sophisticated adversary named LightBasin has been identified as behind a string of attacks targeting the telecom sector with the goal...
Microsoft has warned that hackers linked to Iran are mainly targeting Office 365 clients in defense technology firms. Researchers at Microsoft Threat...
As hackers get smarter than ever, cybersecurity becomes a key concern for businesses. Attackers have ways to break into even the most...
Microsoft has confirmed to mitigate a massive DDoS attack originated from a botnet comprising 70,000 compromised IoT devices. Microsoft reported that an...
Google’s Threat Analysis Group (TAG) on Thursday said it’s tracking more than 270 government-backed threat actors from more than 50 countries, adding...