Threat actors have been leveraging fake websites advertising popular video conferencing software such as Google Meet, Skype, and Zoom to deliver a...
The U.S. State Department has announced monetary rewards of up to $15 million for information that could lead to the identification of...
Cybersecurity researchers have identified malicious packages on the open-source Python Package Index (PyPI) repository that deliver an information stealing malware called WhiteSnake...
Threat actors have been observed leveraging a now-patched security flaw in Microsoft Windows to deploy an open-source information stealer called Phemedrone Stealer....
Information stealing malware are actively taking advantage of an undocumented Google OAuth endpoint named MultiLogin to hijack user sessions and allow continuous...
An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in what’s suspected to be an...
The Russia-linked hacking crew known as Turla has been observed using an updated version of a known second-stage backdoor referred to as...
A relatively new threat actor known as YoroTrooper is likely made up of operators originating from Kazakhstan. The assessment, which comes from...
Multiple hotel chain employees constantly receive emails that they should probably ignore, as they could fall victim to a massive phishing campaign...
Drivers license numbers of around 100,000 ‘ Dashers ‘ have also been accessed. DoorDash revealed in a blog post on Thursday that...
After a group of IT system audit specialists performed an analysis on medical imaging systems connected to the public Internet, it has...
A Romanian citizen was sentenced to 65 months in prison for operating a payment card fraud scheme using an attack variant known...
The attack could have exposed employees’ personal information The US State Department has confirmed that a hacker or group of hackers managed...
Information attacks keep coming Timehop, the social media app was affected by a massive data breach last July 4th, which compromised the...
Short Bytes: Visual Hacking is a security threat that is often overlooked by us. This is the act of stealing information by...
Short Bytes: Was your data compromised in the latest data breaches? How to know if you’ve been hacked? Here are the answers. The...