‘Sandman’ hackers backdoor telcos with new LuaDream malware
A previously unknown threat actor dubbed 'Sandman' targets telecommunication service providers in the Middle East, Western Europe, and South Asia,...
A previously unknown threat actor dubbed 'Sandman' targets telecommunication service providers in the Middle East, Western Europe, and South Asia,...
The UK government has announced its decision to establish a data bridge with the US, enabling the free flow of...
Signal has announced that it upgraded its end-to-end communication protocol to use quantum-resistant encryption keys to protect users from future...
The dreaded data breach is an outcome feared by companies of all sizes in today’s threat landscape, largely due to...
A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect...
The developers of Free Download Manager (FDM) have published a script to check if a Linux device was infected through...
The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then...
Today, T-Mobile customers said they could see other peoples' account and billing information after logging into the company's official mobile...
Credit reporting firm TransUnion has denied claims of a security breach after a threat actor known as USDoD leaked data...
The average annual cost of insider risk incidents has risen to $16.2m per organization in 2023, up from $15.4m in...
Image: Midjourney The BlackCat (ALPHV) ransomware gang now uses stolen Microsoft accounts and the recently spotted Sphynx encryptor to encrypt...
TikTok is flooded by a surge of fake cryptocurrency giveaways posted to the video-sharing platform, with almost all of the...
A Chinese espionage-focused hacker tracked as 'Earth Lusca' was observed targeting government agencies in multiple countries, using a new Linux...
An estimated 12,000 Juniper SRX firewalls and EX switches are vulnerable to a fileless remote code execution flaw that attackers...
Passwords have long been used as the primary gatekeepers of digital security, yet they can also be a weak link...
The malware loader 'Bumblebee' has broken its two-month vacation with a new campaign that employs new distribution techniques that abuse...
The APT36 hacking group, aka 'Transparent Tribe,' has been observed using at least three Android apps that mimic YouTube to infect...
New malware named HTTPSnoop and PipeSnoop are used in cyberattacks on telecommunication service providers in the Middle East, allowing threat...
Scammers are impersonating the bankruptcy claim agent for crypto lender Celsius in phishing attacks that attempt to steal funds from...
GitLab has released security updates to address a critical severity vulnerability that allows attackers to run pipelines as other users...
The International Criminal Court (ICC) disclosed a cyberattack on Tuesday after discovering last week that its systems had been breached....
Trend Micro fixed a remote code execution zero-day vulnerability in the Trend Micro's Apex One endpoint protection solution that was actively exploited...
A Chinese-linked threat actor known as ‘Earth Lusca’ has been conducting cyber espionage campaigns against governments around the world via...
9/15/23 update added below. Trucking and fleet management solutions provider ORBCOMM has confirmed that a ransomware attack is behind recent service...