Apache has released Log4j version 2.15.0 to address the critical RCE vulnerability and users are urged to apply the update immediately. The...
Although there are countless ways to combat cyberattacks, in this article we are addressing 3 simple yet significant points that users can...
Having an internet connection is very crucial whether you are using your desktop, phone, or smart TV. But if you are planning...
So far, the Conti ransomware has not demanded any ransom or published any details of the ransomware attack on their official website....
According to Cisco Talos, abusing the flaw would allow an attacker with limited access to get higher privileges and become an administrator....
The noteworthy aspect of this phishing campaign is that the emails were sent as replies to previously sent messages, due to which...
The new campaign also involves replacing cryptocurrency addresses shared via clipboard and setting up fake cryptocurrency websites. Trend Micro researchers have shared...
DNA Diagnostics Center (DDC) has revealed that hackers managed to access highly sensitive and personal data of users including payment card data....
Brazil-based WiFi management software firm WSpot exposed extensive details of high-profile firms and millions of customers. WSpot provides software to let businesses...
As seen by Hackread.com, the Cl0p ransomware gang has leaked partial SPO data including names, email addresses, passport scans, and more. Swire...
Robinhood data breach involved social engineering attack in which hackers called a customer service staff member and somehow gained access to the...
The FBI acknowledged the unauthorized access over the weekend revealing that spam emails were sent from the agency’s email server to thousands...
The vulnerability existed in the WP Reset PRO WordPress plugin which is used by more than 400,000 websites. The IT security researchers...
The ProxyShell vulnerabilities have prompted threat actors to launch domain-wide ransomware attacks against their targets, revealed a new research report from The...
The vulnerability can be exploited by attackers with physical access to the CPU to breach the security protocols and obtain sensitive information....
”123456” remains the most used and one of the worst passwords of 2021. If you are one of those who believed in...
In September 2021, Bandwidth.com suffered a series of days-long DDoS attacks forcing its service to go offline in the United States. In...
Having secure remote access for employees and following best practices is essential to keep your data secure. In the past few months,...
The 22-year-old British national Joseph James O’Connor, aka PlugwalkJoe, was one of the hackers behind 2020’s massive Twitter hack – PlugwalkJoe also stole...
VPS hosting is beneficial for many reasons but what is the difference between Managed vs. Unmanaged VPS hosting and why does it...
The total number of arrests made concerning Sodinokibi/REvil and GandCrab ransomware is now seven. Europol launched a multi-agency operation to catch REvil...