Phone numbers of 1,900 Signal users exposed as a result of Twilio security breach
For about 1,900 users, Twilio hackers could have attempted to re-register their number to another device or learned that their...
For about 1,900 users, Twilio hackers could have attempted to re-register their number to another device or learned that their...
IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022....
IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022....
IT threat evolution in Q2 2022 IT threat evolution in Q2 2022. Non-mobile statistics IT threat evolution in Q2 2022....
Microsoft disrupted a hacking operation linked conducted by Russia-linked APT SEABORGIUM aimed at NATO countries. The Microsoft Threat Intelligence Center...
In the final part of our series, we look at the APT33 case study and several recommendations from our expert...
Researchers from threat intelligence firm Cyble reported a surge in attacks targeting virtual network computing (VNC). Virtual Network Computing (VNC) is...
Security researchers from Cleafy reported that the SOVA Android banking malware is back and is rapidly evolving. The SOVA Android...
Security Researchers discovered a new PyPI Package designed to drop fileless cryptominer to Linux systems. Sonatype researchers have discovered a...
China-linked threat actors Iron Tiger backdoored a version of the cross-platform messaging app MiMi to infect systems. Trend Micro researchers uncovered a...
Flaws in Xiaomi Redmi Note 9T and Redmi Note 11 models could be exploited to disable the mobile payment mechanism and even...
The US Cybersecurity and Infrastructure Security Agency (CISA) and the FBI are warning of Zeppelin ransomware attacks. The US Cybersecurity...
Russian hacker group Killnet claims to have launched a DDoS attack on the aerospace and defense giant Lockheed Martin. The...
C The NCSC is currently inviting organisations to help develop a new Cyber Advisor service. The initial 100 Cyber Advisor...
Researchers discovered a flaw in three signed third-party UEFI boot loaders that allow bypass of the UEFI Secure Boot feature....
This article explores event-driven architecture (EDA) with a detailed definition and explains how EDA offers many essential benefits to developers....
We found APT group Iron Tiger's malware compromising chat application Mimi’s servers in a supply chain attack. If you like...
The U.S. State Department announced a $10 million reward for information related to five individuals associated with the Conti ransomware gang. The...
Threat actors are exploiting an authentication bypass Zimbra flaw, tracked as CVE-2022-27925, to hack Zimbra Collaboration Suite email servers worldwide. An authentication bypass...
The Conti ransomware gang is using BazarCall phishing attacks as an initial attack vector to access targeted networks. BazarCall attack,...
For more than a year, we have been providing free intelligence services via the OpenTIP portal. Using the web interface,...
We tracked the latest deployment of the group behind CopperStealer, this time stealing cryptocurrencies and users’ wallet account information via...
Explore 5 security considerations in-line with cyber insurance requirements to renew or obtain a policy while reducing your cyber risk....
Palo Alto Networks devices running the PAN-OS are abused to launch reflected amplification denial-of-service (DoS) attacks. Threat actors are exploiting...