Russian hackers use Ngrok feature and WinRAR exploit to attack embassies
After Sandworm and APT28 (known as Fancy Bear), another state-sponsored Russian hacker group, APT29, is leveraging the CVE-2023-38831 vulnerability in...
After Sandworm and APT28 (known as Fancy Bear), another state-sponsored Russian hacker group, APT29, is leveraging the CVE-2023-38831 vulnerability in...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformThe 1E-Exchange-URLResponseTime instruction that is part of the Network product...
A proof-of-concept exploit was publicly released for a critical remote code execution vulnerability in the CrushFTP enterprise suite, allowing unauthenticated...
The Federal Communications Commission (FCC) has revealed new rules to shield consumers from criminals who hijack their phone numbers in...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformThe 1E-Exchange-URLResponseTime instruction that is part of the Network product...
The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated...
Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been observed using a USB propagating worm called...
An RFC on IoCs – playing our part in international standards In August 2023, the IETF published the document Indicators...
The British Library confirmed that a ransomware attack is behind a major outage that is still affecting services across several...
Yamaha Motor's Philippines motorcycle manufacturing subsidiary was hit by a ransomware attack last month, resulting in the theft and leak...
The U.S. Cybersecurity & Infrastructure Security Agency has added to its catalog of known exploited vulnerabilities (KEV) three security issues...
Ransomware gangs target exposed Citrix Netscaler devices using a publicly available exploit to breach large organizations, steal data, and encrypt...
Image: Bloomberg Crypto The official Twitter account for Bloomberg Crypto was used earlier today to redirect users to a deceptive...
Google's Threat Analysis Group (TAG) has discovered that threat actors exploited a zero-day vulnerability in Zimbra Collaboration email server to steal sensitive...
involving the spoofing of luxury brands, including Louis Vuitton, Rolex, and Ray-Ban.The hackers craft enticing emails promising heavy discounts on...
Royal Mail has revealed a multimillion-pound cost attached to a serious ransomware breach it suffered earlier this year.The British postal...
One of the world’s largest libraries has confirmed it was hit by a ransomware attack on October 28, and that...
The FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have released a detailed cybersecurity advisory on the sophisticated Scattered...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info1e -- platformThe 1E-Exchange-URLResponseTime instruction that is part of the Network product...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added three security flaws to its Known Exploited Vulnerabilities (KEV)...
U.S. cybersecurity and intelligence agencies have released a joint advisory about a cybercriminal group known as Scattered Spider that's known...
An unknown threat actor has been observed publishing typosquat packages to the Python Package Index (PyPI) repository for nearly six...
Threat actors are leveraging manipulated search results and bogus Google ads that trick users who are looking to download legitimate...
The U.S. Federal Communications Commission (FCC) is adopting new rules that aim to protect consumers from cell phone account scams...