North Korean Hackers Now Launder Stolen Crypto Via Yomix Tumbler
The North Korean hacker collective Lazarus, infamous for having carried out numerous large-scale cryptocurrency heists over the years, has switched...
The North Korean hacker collective Lazarus, infamous for having carried out numerous large-scale cryptocurrency heists over the years, has switched...
SolarWinds has patched five remote code execution (RCE) flaws in its Access Rights Manager (ARM) solution, including three critical severity...
Security researchers analyzing the Alpha ransomware payload and modus operandi discovered overlaps with the now-defunct Netwalker ransomware operation. Netwalker was a prolific...
Organizations based in the EU are being targeted by spear phishing campaigns leveraging EU political and diplomatic events, according to...
The developer of Qakbot malware, or someone with access to the source code, seems to be experimenting with new builds as fresh samples...
Thousands of Ivanti Connect Secure and Policy Secure endpoints remain vulnerable to multiple security issues first disclosed more than a...
In today's interconnected world, web application security is crucial for business continuity. Yet, web application attacks are now involved in...
A new iOS and Android trojan named 'GoldPickaxe' employs a social engineering scheme to trick victims into scanning their faces...
Security researchers have identified and analyzed new malware they call TinyTurla-NG and TurlaPower-NG used by the Russian hacker group Turla...
The U.S. State Department is offering rewards of up to $10 million for information that could lead to the identification...
The RansomHouse ransomware operation has created a new tool named 'MrAgent' that automates the deployment of its data encrypter across multiple VMware...
Ukrainian national Vyacheslav Igorevich Penchukov, one of the heads of the notorious JabberZeus cybercrime gang, has pleaded guilty to charges...
The FBI took down a botnet of small office/home office (SOHO) routers used by Russia's Main Intelligence Directorate of the...
OpenAI has removed accounts used by state-sponsored threat groups from Iran, North Korea, China, and Russia, that were abusing its...
A logic flaw between Ubuntu's 'command-not-found' package suggestion system and the snap package repository could enable attackers to promote malicious...
Battery maker VARTA AG announced yesterday that it was targeted by a cyberattack that forced it to shut down IT...
The Zoom desktop and VDI clients and the Meeting SDK for Windows are vulnerable to an improper input validation flaw...
Hackers are believed to have used a stolen private key to mint and steal over 1.79 billion PLA tokens, a...
The DuckDuckGo browser has unveiled a new end-to-end encrypted Sync & Backup feature that lets users privately and securely synchronize...
Microsoft warned today in an updated security advisory that a critical vulnerability in Exchange Server was exploited as a zero-day before...
Microsoft is automatically enabling Windows Extended Protection on Exchange servers after installing this month's 2024 H1 Cumulative Update (aka CU14)....
The LockBit ransomware gang claims to be behind the recent cyberattack on Fulton County, Georgia, and is threatening to publish...
Update February 14, 16:50 EST: Article and title revised after Microsoft retracted the "active exploitation" update added to the CVE-2024-21413...
Trans-Northern Pipelines (TNPI) has confirmed its internal network was breached in November 2023 and that it's now investigating claims of...