Fake in-browser Windows updates push Aurora info-stealer malware
A recently spotted malvertising campaign tricked users with an in-browser Windows update simulation to deliver the Aurora information stealing malware....
A recently spotted malvertising campaign tricked users with an in-browser Windows update simulation to deliver the Aurora information stealing malware....
Industrial cybersecurity company Dragos today disclosed what it describes as a "cybersecurity event" after a known cybercrime gang attempted to...
The Korean National Police Agency (KNPA) warned that North Korean hackers had breached the network of one of the country's...
A new 'White Phoenix' ransomware decryptor allows victims to partially recover files encrypted by ransomware strains that use intermittent encryption....
New samples of the RapperBot botnet malware have added cryptojacking capabilites to mine for cryptocurrency on compromised Intel x64 machines....
As cybersecurity threats continue to evolve, brute-force attacks have become a growing concern. To address this issue, AI Spera released...
Cybersecurity and intelligence agencies from all Five Eyes member nations took down the infrastructure used by the Snake cyber-espionage malware...
A new malware botnet named 'AndoryuBot' is targeting a critical-severity flaw in the Ruckus Wireless Admin panel to infect unpatched...
Sysco, a leading global food distribution company, has confirmed that its network was breached earlier this year by attackers who...
The National Police of Spain have arrested two hackers, 15 members of a criminal organization, and another 23 people involved...
A new Linux NetFilter kernel flaw has been discovered, allowing unprivileged local users to escalate their privileges to root level,...
GitHub is now automatically blocking the leak of sensitive information like API keys and access tokens for all public code...
As QR codes continue to be heavily used by legitimate organizations—from Super Bowl advertisements to enforcing parking fees and fines,...
Data theft is the act of stealing data stored in business databases, endpoints, and servers. The stolen data can include...
Intel is investigating the leak of alleged private keys used by the Intel Boot Guard security feature, potentially impacting its...
cyberstress.org seizure banner (DOJ) The U.S. Justice Department announced today the seizure of 13 more domains linked to DDoS-for-hire platforms,...
Microsoft says Iranian state-backed hackers have joined the ongoing assault targeting vulnerable PaperCut MF/NG print management servers. These groups are tracked...
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large...
Finish newspaper Helsinin Sanomat has created a custom Counter-Strike: Global Offensive (CS:GO) map explicitly made to bypass Russian news censorship...
Western Digital has taken its store offline and sent customers data breach notifications after confirming that hackers stole sensitive personal...
The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt...
A new proof-of-concept (PoC) exploit for an actively exploited PaperCut vulnerability was released that bypasses all known detection rules. The PaperCut...
Twitter disclosed that a 'security incident' caused private tweets sent to Twitter Circles to show publicly to users outside of...
Canadian diversified software company Constellation Software confirmed on Thursday that some of its systems were breached by threat actors who...