IPStorm botnet with 23,000 proxies for malicious traffic dismantled
The U.S. Department of Justice announced today that Federal Bureau of Investigation took down the network and infrastructure of a botnet...
The U.S. Department of Justice announced today that Federal Bureau of Investigation took down the network and infrastructure of a botnet...
VMware disclosed a critical and unpatched authentication bypass vulnerability affecting Cloud Director appliance deployments. Cloud Director enables VMware admins to...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesBrowser Medium RiskRemote Code Execution Elevation of Privilege Spoofing Azure Medium...
The UK’s critical infrastructure (CNI) providers face a persistent and critical threat from emboldened state-backed and aligned actors, a leading...
Security researchers have discovered a total of 3938 unique secrets on PyPI, the official third-party package management system for the...
Cyber-criminals have been observed disabling or wiping out logs in 82% of incidents. The findings come from the latest report from...
The Royal ransomware group has targeted more than 350 global victims since September 2022, demanding hundreds of millions in ransom...
A Middle Eastern advanced persistent threat (APT) group launched a new series of targeted cyber-espionage attacks from July to October...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach,...
The Vietnamese threat actors behind the Ducktail stealer malware have been linked to a new campaign that ran between March...
Criminal IP, a prominent Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently integrated with Cisco SecureX/XDR,...
A cyberattack on international logistics firm DP World Australia has severely disrupted the regular freight movement in multiple large Australian ports....
Malicious actors have been abusing Ethereum's 'Create2' function to bypass wallet security alerts and poison cryptocurrency addresses, which led to...
Data-wiping attacks are becoming more frequent on Israeli computers as researchers discovered variants of the BiBi malware family that destroys...
The FBI and CISA revealed in a joint advisory that the Royal ransomware gang has breached the networks of at...
CISA warned federal agencies today to secure Juniper devices on their networks by Friday against four vulnerabilities now used in remote...
Multiple vulnerabilities were identified in Juniper Junos OS. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
One of Australia’s biggest port operators is slowly recovering from a “nationally significant” cyber-incident that struck late last week, potentially...
Security researchers have identified a new cyber-threat targeting publicly exposed instances of the Docker Engine API. In this campaign, attackers exploit...
Police in Malaysia have disrupted a major phishing-as-a-service (PhaaS) and initial access broker (IAB) operation that supplied thousands of threat...
The EU has cemented ties with Ukraine on cybersecurity cooperation, with a new formal agreement designed to improve information sharing...
The global online gaming community is facing a rising threat from cyber-criminals exploiting vulnerabilities inherent in gamers’ interactions with digital content. A recent...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...