Threat actors leaked data stolen from EA, including FIFA code
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure...
Threat actors that hacked Electronic Arts in June have leaked full data dump stolen from the company after the failure...
Microsoft Office 365 email accounts of employees at 27 US Attorneys’ offices were breached by the Russia-linked SVR group as part of...
In the latest study, researchers at Positive Technologies have documented the evolution of hacker-placed ads on the Dark Web from...
The Copilot service developed by Microsoft and GitHub specialists, designed to simplify the work of programmers, can be used by...
The cyber-attack that crippled Iran's national railway system at the beginning of the month was caused by a disk-wiping malware...
The Polish authorities have detained two individuals committing so-called ‘Black Box’ attacks, targeting ATMs, whereby criminal offenders attach electronic devices...
After a ransomware cyberattack on its internal information-technology systems, D-BOX Technologies Inc. says it is progressively resuming operations, with restoration...
Experts spotted a new strain of Android banking Trojan dubbed Vultur that uses screen recording and keylogging for the capturing...
Researcher published an exploit code for a high-severity privilege escalation flaw (CVE-2021-3490) in Linux kernel eBPF on Ubuntu machines. The...
LemonDuck has evolved from a Monero cryptominer into LemonCat, a Trojan that specializes in backdoor installation, credential and data theft,...
Social engineering attacks have been a longstanding concern for both individuals and organizations alike. The trend, as we know it,...
Computer science student Augusto Zanellato has earned a $50,000 payday following the discovery of a publicly available GitHub Personal Access...
RiskIQ's research team has evaluated the familiar fingerprints campaign in dangerous infrastructure from famous malware families. Their examination of Agent...
Attackers' evasive methods stretch back to the times when base64 and other popular encoding schemes were utilized. New Linux shell script...
As part of a fresh campaign that began in May 2021, an Android malware that was discovered misusing accessibility features...
Estonia ‘s police arrested a man from Tallinn that is suspected to be the hacker who stole 286K ID scans...
The recent attack against Iran’s national railway system was caused by a wiper malware dubbed Meteor and not by a ransomware as initially thought....
The cyber threat landscape change continuously, recently two new ransomware-as-service (RaaS) operations named BlackMatter and Haron made the headlines. Recently,...
In a revision of KnowledgeBase article KB5005413, Microsoft has provided more elaborate mitigation instructions for the PetitPotam attacks that were...
This blog post was authored by Hossein Jazi. On July 21, 2021, we identified a suspicious document named “Манифест.docx” (“Manifest.docx”)...
The Prosecutor General's Office of the Russian Federation reported that Russia has submitted to the UN the world's first draft...
Cybersecurity researchers from South Korean security firm S2W Labs have unearthed two new ransomware groups. A sample of the first...
The cybersecurity researchers from Safety Detectives uncovered an insecure Microsoft Azure Blob storage server linked to the Raven Hengelsport retail...
The Personally Identifiable Information (PII) of approximately 100 million users of local business listing site JustDial was at stake after...