Patchwork APT caught in its own web
Patchwork is an Indian threat actor that has been active since December 2015 and usually targets Pakistan via spear phishing...
Patchwork is an Indian threat actor that has been active since December 2015 and usually targets Pakistan via spear phishing...
Three years ago on Quora, someone asked what writers do to keep their manuscripts from being stolen. One of the...
French privacy watchdog, the Commission Nationale de l’Informatique et des Libertés (CNIL), has hit Google with a 150 million euro...
A threat actor attempted to exploit the Log4Shell vulnerability to hack VMWare Horizon servers at UK NHS and deploy web...
Experts warn that the popular antivirus product Norton 360 has installed a cryptocurrency miner on its customers’ computers. Many users...
The appointment scheduling service FlexBooker discloses a data breach that impacted over 3.7 million accounts. Threat actors compromised the FlexBooker...
Researchers warn of a new ransomware family, called ‘Night Sky,’ that uses a double-extortion model in attacks again businesses. Researchers...
North Korea-linked APT group Konni targets Russian Federation’s Ministry of Foreign Affairs (MID) new versions of malware implants. Security researchers...
NY OAG warned 17 companies that roughly 1.1 million of their customers have had their user accounts compromised in credential...
Experts warn of a new phishing technique that abuses the commenting feature of Google Docs to send out emails that...
When removing malware from an iOS device, it is said that users need to restart the device to clear the...
The French data privacy and protection authority hit Google and Facebook with 210 million euros ($237 million) in fines. France’s...
The New York State Office of the Attorney General has warned 17 companies that roughly 1.1 million customers have had...
Two-factor authentication (2FA) has been around for a while now and for the majority of tech users in the US...
Over 100 real estate websites have been compromised by the same web skimmer in a supply chain attack. So what...
Researchers devised a sophisticated persistence technique, named NoReboot, for iOS malware that fake shut downs. Researchers from Zecops devised a...
VMware addressed a heap-overflow issue (CVE-2021-22045) in Workstation, Fusion and CVE-2021-22045 products that can lead to code execution on the...
In this workshop, you’ll learn how to leverage DevOps Security with your serverless applications running on AWS Lambda or containerized...
The US Federal Trade Commission (FTC) has warned legal action against companies who fail to secure their infrastructure against Log4Shell...
On New Year’s Eve, Seif Elsallamy (@0x21SAFE on Twitter), a bug bounty hunter and security researcher, pointed out a phish-worthy security...
There’s a lot of concern in the cryptocurrency realm at the moment. A yield farming platform “utilizing arbitrage to gain...
Threat actors continue to attempt to exploit Apache Log4J vulnerabilities in their campaigns to deploy malware on target systems, Microsoft...
Cybersecurity researchers demonstrate how to use electromagnetic field emanations from IoT devices to detect malware. A team of academics (Duy-Phuc...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...