FBI: Business email compromise tactics used to defraud U.S. vendors
The Federal Bureau of Investigation is warning companies in the U.S. of threat actors using tactics similar to business email...
The Federal Bureau of Investigation is warning companies in the U.S. of threat actors using tactics similar to business email...
A new Emotet phishing campaign is targeting U.S. taxpayers by impersonating W-9 tax forms allegedly sent by the Internal Revenue...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A new ransomware operation named 'Dark Power' has appeared, and it has already listed its first victims on a dark...
American university researchers have developed a novel attack called "Near-Ultrasound Inaudible Trojan" (NUIT) that can launch silent attacks against devices...
Russia's Rostec has reportedly bought a platform that allows it to uncover the identities of anonymous Telegram users, likely to...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
OpenAI on Friday disclosed that a bug in the Redis open source library was responsible for the exposure of other...
In what's a case of setting a thief to catch a thief, the U.K. National Crime Agency (NCA) revealed that...
Microsoft on Friday shared guidance to help customers discover indicators of compromise (IoCs) associated with a recently patched Outlook vulnerability....
GitHub has rotated its private SSH key for GitHub.com after the secret was was accidentally published in a public GitHub repository. The software...
The U.K.'s National Crime Agency (NCA) revealed today that they created multiple fake DDoS-for-hire service websites to identify cybercriminals who utilize...
OpenAI says a Redis client open-source library bug was behind Monday's ChatGPT outage and data leak, where users saw other...
A cyberespionage hacking group tracked as 'Bitter APT' was recently seen targeting the Chinese nuclear energy industry using phishing emails...
Consumer goods giant Procter & Gamble has confirmed a data breach affecting an undisclosed number of employees after its GoAnywhere...
Today, the FBI confirmed they have access to the database of the notorious BreachForums (aka Breached) hacking forum after the...
The Australian Federal Police (AFP) has arrested four members of a cybercriminal syndicate that has laundered $1.7 million stolen from...
On the third day of the Pwn2Own hacking contest, security researchers were awarded $185,000 after demonstrating 5 zero-day exploits targeting...
This week's news has been dominated by the Clop ransomware gang extorting companies whose GoAnywhere services were breached using a...
Microsoft today published a detailed guide aiming to help customers discover signs of compromise via exploitation of a recently patched...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A malicious Python package on the Python Package Index (PyPI) repository has been found to use Unicode as a trick...
Any app that can improve business operations is quickly added to the SaaS stack. However, employees don't realize that this...
A recent campaign undertaken by Earth Preta indicates that nation-state groups aligned with China are getting increasingly proficient at bypassing...