Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical security flaw in Citrix NetScaler application delivery control...
The China-linked Mustang Panda actor has been linked to a cyber attack targeting a Philippines government entity amid rising tensions between the...
The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated attacks. The...
Cybersecurity researchers are warning of suspected exploitation of a recently disclosed critical security flaw in the Apache ActiveMQ open-source message broker service...
The Russia-linked hacking crew known as Turla has been observed using an updated version of a known second-stage backdoor referred to as...
VMware has released security updates to address a critical flaw in the vCenter Server that could result in remote code execution on...
Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that’s both sophisticated and fast. “What makes Rorschach...
U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures (TTPs) associated...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which emerged in the threat landscape...
In what’s a case of hacking the hackers, the darknet infrastructure associated with the Hive ransomware-as-a-service (RaaS) operation has been seized as...
Cybersecurity researchers have published the inner workings of a new wiper called Azov Ransomware that’s deliberately designed to corrupt data and “inflict...
New research has disclosed what’s being called a security vulnerability in Microsoft 365 that could be exploited to infer message contents due...
An enhanced version of the XLoader malware has been spotted adopting a probability-based approach to camouflage its command-and-control (C&C) infrastructure, according to...
A previously undocumented backdoor has been observed targeting Linux systems with the goal of corralling the machines into a botnet and acting...
The Quickfox VPN is mainly used by Chinese citizens living abroad who need to access Chinese websites as most of these sites...
Governments and regimes across the globe use censorship as a tool to control the flow of information. This article highlights how one...
Generally, agencies crack messages or seize an already available encrypted communication platform to keep track of cybercriminals. Two such examples would be...
In an unprecedented sting operation, the U.S. Federal Bureau of Investigation (FBI) and Australian Federal Police (AFP) ran an encrypted chat service...
Around two years back, North Carolina State University researchers discovered [PDF] that over 100,000 GitHub repositories had leaked cryptographic (TLS and SSH)...
Forget about your products and services. Ignore all of your marketing efforts. The most essential aspect of a successful online business is...
When you think of WhatsApp, other than privacy concerns, the first thing that comes to your mind is chats or free video...