Hackers use open source Merlin post-exploitation toolkit in attacks
Ukraine is warning of a wave of attacks targeting state organizations using 'Merlin,' an open-source post-exploitation and command and control...
Ukraine is warning of a wave of attacks targeting state organizations using 'Merlin,' an open-source post-exploitation and command and control...
Missouri's Department of Social Services warns that protected Medicaid healthcare information was exposed in a data breach after IBM suffered...
A serious data leak has exposed the personal details of police officers and civilian personnel working at the Police Service...
A phishing-as-a-service (PaaS) platform which may have been responsible for over 150,000 phishing domains has been taken offline after an...
The UK’s financial regulatory has warned consumers to be on the lookout for loan fee fraudsters after revealing new research...
Microsoft released updates for 87 vulnerabilities yesterday, including two that are being actively exploited in the wild.The first zero-day was...
The Missouri Department of Social Services (DSS) has issued an alert urging residents to safeguard their personal information following a...
The Rhysida ransomware group, a recent addition to the growing threat landscape, has been implicated in a string of high-impact...
A new security loophole has been found in Spring Security’s latest versions. Tracked as CVE-2023-34034, the flaw has a CVSS...
Multiple zero-day vulnerabilities have been discovered in some of the most used cryptographic multi-party computation (MPC) protocols, putting consumers’ cryptocurrency...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoyunyecms -- yunyecmsSQL injection vulnerability in yunyecms 2.0.2 allows remote attackers to...
Hackers associated with China's Ministry of State Security (MSS) have been linked to attacks in 17 different countries in Asia,...
Cybersecurity researchers have disclosed details of a trio of side-channel attacks that could be exploited to leak sensitive data from...
Cyber-criminals continue to impersonate brands via well-crafted phishing websites. We previously covered attacks on both consumers and businesses via online searches...
Exposed Kubernetes (K8s) clusters are being exploited by malicious actors to deploy cryptocurrency miners and other backdoors. Cloud security firm...
Tactical similarities have been unearthed between the double extortion ransomware group known as Rhysida and Vice Society, including in their...
Validate security continuously across your full stack with Pen Testing as a Service. In today's modern security operations center (SOC),...
The U.K. Electoral Commission on Tuesday disclosed a "complex" cyber attack on its systems that went undetected for over a...
Microsoft has patched a total of 74 flaws in its software as part of the company's Patch Tuesday updates for...
Google has introduced a new security feature in Android 14 that allows IT administrators to disable support for 2G cellular...
To SOC or not to SOC ? So, you are implementing a large digital project, and have followed the GOV.UK...
Spotlight on shadow IT ‘Shadow IT’ (also known as ‘grey IT’) is the name given to those unknown IT assets...
The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in...
The Colorado Department of Higher Education (CDHE) discloses a massive data breach impacting students, past students, and teachers after suffering...