New CISA tool detects hacking activity in Microsoft cloud services
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released a new open-source incident response tool that helps detect signs...
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has released a new open-source incident response tool that helps detect signs...
A new variant of the BlackGuard stealer has been spotted in the wild, featuring new capabilities like USB propagation, persistence...
City of Toronto is among Clop ransomware gang's latest victims hit in the ongoing GoAnywhere hacking spree. Other victims listed alongside the Toronto city...
Automattic, the company behind the WordPress content management system, is force installing a security update on hundreds of thousands of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Google has stepped in to remove a bogus Chrome browser extension from the official Web Store that masqueraded as OpenAI's...
Telecommunication providers in the Middle East are the subject of new cyber attacks that commenced in the first quarter of...
An emerging Android banking trojan dubbed Nexus has already been adopted by several threat actors to target 450 financial applications...
In 2022 alone, global cyberattacks increased by 38%, resulting in substantial business loss, including financial and reputational damage. Meanwhile, corporate...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
German and South Korean government agencies have warned about cyber attacks mounted by a threat actor tracked as Kimsuky using...
Proof-of-concept exploits for vulnerabilities in Netgear’s Orbi 750 series router and extender satellites have been released, with one flaw a...
A new credit card stealing hacking campaign is doing things differently than we have seen in the past by hiding...
On the first day of Pwn2Own Vancouver 2023, security researchers successfully demoed Tesla Model 3, Windows 11, and macOS zero-day...
Fresh produce giant Dole Food Company has confirmed threat actors behind a February ransomware attack have accessed the information of...
A trojanized version of the legitimate ChatGPT extension for Chrome is gaining popularity on the Chrome Web Store, accumulating over...
A joint cybersecurity advisory from the German Federal Office for the Protection of the Constitution (BfV) and the National Intelligence...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released eight Industrial Control Systems (ICS) advisories on Tuesday, warning of...
Amid the ongoing war between Russia and Ukraine, government, agriculture, and transportation organizations located in Donetsk, Lugansk, and Crimea have...
Active Directory (AD) is a powerful authentication and directory service used by organizations worldwide. With this ubiquity and power comes...
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in...
The North Korean advanced persistent threat (APT) actor dubbed ScarCruft is using weaponized Microsoft Compiled HTML Help (CHM) files to...
The NuGet repository is the target of a new "sophisticated and highly-malicious attack" aiming to infect .NET developer systems with...
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in...