German police identified a gang that stole €4 million via phishing attacks
German police arrested one individual suspected of having stolen €4 million from users via large-scale phishing campaigns. Germany’s Bundeskriminalamt (BKA)...
German police arrested one individual suspected of having stolen €4 million from users via large-scale phishing campaigns. Germany’s Bundeskriminalamt (BKA)...
Cloud configuration errors are a major concern for modern DevOps teams, introducing a new attack surface with numerous potential points...
CISA added a recently disclosed flaw in Atlassian Bitbucket Server, tracked as CVE-2022-36804, to its Known Exploited Vulnerabilities Catalog. The U.S....
A hacker group called Guacamaya stole classified government information from multiple military and government agencies across several Latin American countries....
The Shangri-La hotel group disclosed a data breach, a database containing the personal information of its customers was compromised. The...
A cyberespionage group, tracked as Witchetty, used steganography to hide a previously undocumented backdoor in a Windows logo. Broadcom’s Symantec...
The US Department of Defense (DoD) shared the results of the Hack US bug bounty program that took place in July....
Microsoft confirmed that two recently disclosed zero-day flaws in Microsoft Exchange are being actively exploited in the wild. Microsoft confirmed...
Security researchers are warning of a new Microsoft Exchange zero-day that are being exploited by malicious actors in the wild....
Researchers from Mandiant have discovered a novel malware persistence technique within VMware ESXi Hypervisors. Mandiant detailed a novel technique used...
UMAS (Unified Messaging Application Services) is a proprietary Schneider Electric (SE) protocol used to configure and monitor Schneider Electric PLCs....
63% of c-level executives in the US don’t have an incident response plan yet 50% of organizations experience a cyberattack....
In this entry, we discuss how developers can use custom cloud container image and the distroless approach to minimize security...
In this entry, we discuss how developers can use custom cloud container image and the distroless approach to minimize security...
Several hacker groups are assisting protestors in Iran using Telegram, Signal and other tools to bypass government censorship. Check Point...
The Brute Ratel post-exploitation toolkit has been cracked and now is available in the underground hacking and cybercrime communities. Threat...
A new multifunctional Go-based malware dubbed Chaos is targeting both Windows and Linux systems, experts warn. Researchers from Black Lotus Labs...
Prilex is a Brazilian threat actor that has evolved out of ATM-focused malware into modular point-of-sale malware. The group was...
The recently discovered malware builder Quantum Builder is being used by threat actors to deliver the Agent Tesla RAT. A...
ONLINE DISINFORMATION is one of the defining issues of our time and the influence of fake news has become an...
The Russia-linked APT28 group is using mouse movement in decoy Microsoft PowerPoint documents to distribute malware. The Russia-linked APT28 employed a technique...
The recently born Bl00Dy Ransomware gang has started using the recently leaked LockBit ransomware builder in attacks in the wild....
nuvola is the new open-source cloud security tool to address the privilege escalation in cloud environments. nuvola is the new...
Meta dismantled a network of Facebook and Instagram accounts spreading disinformation across European countries. Meta announced to have taken down...