Criminal IP & Cisco SecureX/XDR: Enhanced Cyber Threat Analysis
Criminal IP, a prominent Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently integrated with Cisco SecureX/XDR,...
Criminal IP, a prominent Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently integrated with Cisco SecureX/XDR,...
A cyberattack on international logistics firm DP World Australia has severely disrupted the regular freight movement in multiple large Australian ports....
Malicious actors have been abusing Ethereum's 'Create2' function to bypass wallet security alerts and poison cryptocurrency addresses, which led to...
Data-wiping attacks are becoming more frequent on Israeli computers as researchers discovered variants of the BiBi malware family that destroys...
The FBI and CISA revealed in a joint advisory that the Royal ransomware gang has breached the networks of at...
CISA warned federal agencies today to secure Juniper devices on their networks by Friday against four vulnerabilities now used in remote...
Multiple vulnerabilities were identified in Juniper Junos OS. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
One of Australia’s biggest port operators is slowly recovering from a “nationally significant” cyber-incident that struck late last week, potentially...
Police in Malaysia have disrupted a major phishing-as-a-service (PhaaS) and initial access broker (IAB) operation that supplied thousands of threat...
The EU has cemented ties with Ukraine on cybersecurity cooperation, with a new formal agreement designed to improve information sharing...
The global online gaming community is facing a rising threat from cyber-criminals exploiting vulnerabilities inherent in gamers’ interactions with digital content. A recent...
Security researchers have identified a new cyber-threat targeting publicly exposed instances of the Docker Engine API. In this campaign, attackers exploit...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
The threat actors behind a new ransomware group called Hunters International have acquired the source code and infrastructure from the...
Malaysian law enforcement authorities have announced the takedown of a phishing-as-a-service (PhaaS) operation called BulletProofLink. The Royal Malaysia Police said...
Cybersecurity researchers have discovered what they say is malicious cyber activity orchestrated by two prominent Chinese nation-state hacking groups targeting...
Cybersecurity researchers have warned about a Windows version of a wiper malware that was previously observed targeting Linux systems in...
Security researchers have tracked a new campaign from Imperial Kitten targeting transportation, logistics, and technology firms. Imperial Kitten is also...
The LockBit ransomware gang published data stolen from Boeing, one of the largest aerospace companies that services commercial airplanes and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
The notorious BulletProftLink phishing-as-a-service (PhaaS) platform that provided more than 300 phishing templates has been seized, the Royal Malaysian Police announced. The operation...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
A sub-cluster within the infamous Lazarus Group has established new infrastructure that impersonates skills assessment portals as part of its...
The intersection of healthcare, entrusted with our most personal and sensitive data, and cybersecurity paints a worrying picture. Hospitals, physicians'...