Google links WinRAR exploitation to Russian, Chinese state hackers
Google says that several state-backed hacking groups have joined ongoing attacks exploiting a high-severity vulnerability in WinRAR, a compression software used by...
Google says that several state-backed hacking groups have joined ongoing attacks exploiting a high-severity vulnerability in WinRAR, a compression software used by...
An updated version of the MATA backdoor framework was spotted in attacks between August 2022 and May 2023, targeting oil...
A critical vulnerability tracked as CVE-2023-4966 in Citrix NetScaler ADC/Gateway devices has been actively exploited as a zero-day since late August,...
Hackers are scanning for internet-exposed Jupyter Notebooks to breach servers and deploy a cocktail of malware consisting of a Linux...
Google has announced new, real-time scanning features for Google Play Protect that make it harder for malicious apps employing polymorphism...
A hacker has leaked an additional 4.1 million stolen 23andMe genetic data profiles for people in Great Britain and Germany...
A group of cyber activists under the Ukrainian Cyber Alliance banner has hacked the servers of the Trigona ransomware gang...
Marquis Hooper, a former U.S. Navy IT manager, has received a sentence of five years and five months in prison...
Microsoft says that the North Korean Lazarus and Andariel hacking groups are exploiting the CVE-2023-42793 flaw in TeamCity servers to...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info3ds -- teamwork_cloud_no_magic_releaseA Cross-Site Request Forgery (CSRF) vulnerability affecting Teamwork Cloud from...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
Our new principles to help make cloud backups more resilient Every month there are press reports of a global organisation...
Update October 17, 16:40 EDT: Added new information on breached Cisco IOS XE devices. Attackers have exploited a recently disclosed...
As an IT professional, you know that threat actors work overtime to get your end-users’ credentials. Whether it’s 3 PM...
The Android 'SpyNote' malware was observed in attacks targeting Italy using a fake 'IT-alert' public alert service that infected visitors...
Taiwanese networking equipment manufacturer D-Link confirmed a data breach linked to information stolen from its network and put up for...
A new Google Search malvertizing campaign targets users looking to download the popular Notepad++ text editor, employing advanced techniques to...
Kwik Trip has released another statement on an ongoing outage, all but confirming it suffered a cyberattack that has led...
Amazon has quietly added passkey support as a new passwordless login option for customers, offering better protection from information-stealing malware...
Security researchers found that IT administrators are using tens of thousands of weak passwords to protect access to portals, leaving...
HIBP In July 2021, the Android applications and games review site AndroidLista suffered a data breach. The incident exposed 6.6M...
HIBP In mid-2021, the "vintage messaging reborn" service Phoenix suffered a data breach that exposed 75k unique email addresses. The...
The Information provided at the time of posting was detected as "Posh C2". Depending on when you are viewing this...