Russian Coldriver Hackers Deploy Malware to Target Western Officials
Russian threat group Coldriver has expanded its targeting of Western officials with the use of malware to steal sensitive data,...
Russian threat group Coldriver has expanded its targeting of Western officials with the use of malware to steal sensitive data,...
South Africa, known to be 'the world's most internet-addicted country,' finds itself plagued by the internet's dark underbelly: ransomware.It is...
Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of granting attackers remote control to infected...
In the current digital landscape, data has emerged as a crucial asset for organizations, akin to currency. It's the lifeblood...
There are reports of active exploitation of a critical authentication bypass vulnerability (CVE-2023-35082) in Ivanti's Endpoint Manager Mobile (EPMM) and...
Multiple vulnerabilities were identified in ChromeOS. A remote attacker could exploit some of these vulnerabilities to trigger denial of service...
A malicious package uploaded to the npm registry has been found deploying a sophisticated remote access trojan on compromised Windows...
A new campaign targeting vulnerable Docker services deploys an XMRig miner and the 9hits viewer app on compromised hosts, allowing...
Appliances giant Haier issued a takedown notice to a software developer for creating Home Assistant integration plugins for the company's...
The United States government has recommended that Conor Brian Fitzpatrick, the creator and lead administrator of the now-defunct BreachForums hacking...
Google says the ColdRiver Russian-backed hacking group is pushing previously unknown backdoor malware using payloads masquerading as a PDF decryption tool....
Infostealer malware is one of the most substantial and underappreciated risk vectors for corporate information security teams. Infostealers infect computers,...
Ransomware actors are again using TeamViewer to gain initial access to organization endpoints and attempt to deploy encryptors based on...
Kansas State University (K-State) announced it is managing a cybersecurity incident that has disrupted certain network systems, including VPN, K-State...
CISA warns that a critical authentication bypass vulnerability in Ivanti's Endpoint Manager Mobile (EPMM) and MobileIron Core device management software...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical flaw impacting Ivanti Endpoint Manager Mobile...
Multiple vulnerabilities were identified in Citrix Products. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
One of the UK’s leading cybersecurity agencies has announced plans to convene a new group of industry experts who will...
Cybersecurity researchers at Proofpoint have identified the resurgence of TA866 in email threat campaigns after a hiatus of nine months. Writing...
Security researchers have uncovered a novel cyber-attack campaign targeting vulnerable Docker services. The attacks mark the first documented case of...
Iran-linked threat actors are targeting high-profile researchers working on the Israel-Hamas conflict via a sophisticated social engineering campaign, according to...
The value of cryptocurrency flowing into illicit addresses in 2023 was nearly two-fifths lower than the figure a year previously,...
Vulnerable Docker services are being targeted by a novel campaign in which the threat actors are deploying XMRig cryptocurrency miner...