Python Package Index Faces Security Crisis With Validated Leaks
Security researchers have discovered a total of 3938 unique secrets on PyPI, the official third-party package management system for the...
Security researchers have discovered a total of 3938 unique secrets on PyPI, the official third-party package management system for the...
Cyber-criminals have been observed disabling or wiping out logs in 82% of incidents. The findings come from the latest report from...
The Royal ransomware group has targeted more than 350 global victims since September 2022, demanding hundreds of millions in ransom...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
Effective marketing operations today are driven by the use of Software-as-a-Service (SaaS) applications. Marketing apps such as Salesforce, Hubspot, Outreach,...
The Vietnamese threat actors behind the Ducktail stealer malware have been linked to a new campaign that ran between March...
Criminal IP, a prominent Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, has recently integrated with Cisco SecureX/XDR,...
A cyberattack on international logistics firm DP World Australia has severely disrupted the regular freight movement in multiple large Australian ports....
Malicious actors have been abusing Ethereum's 'Create2' function to bypass wallet security alerts and poison cryptocurrency addresses, which led to...
Data-wiping attacks are becoming more frequent on Israeli computers as researchers discovered variants of the BiBi malware family that destroys...
The FBI and CISA revealed in a joint advisory that the Royal ransomware gang has breached the networks of at...
CISA warned federal agencies today to secure Juniper devices on their networks by Friday against four vulnerabilities now used in remote...
Multiple vulnerabilities were identified in Juniper Junos OS. A remote attacker could exploit some of these vulnerabilities to trigger denial of...
One of Australia’s biggest port operators is slowly recovering from a “nationally significant” cyber-incident that struck late last week, potentially...
The global online gaming community is facing a rising threat from cyber-criminals exploiting vulnerabilities inherent in gamers’ interactions with digital content. A recent...
Security researchers have identified a new cyber-threat targeting publicly exposed instances of the Docker Engine API. In this campaign, attackers exploit...
Police in Malaysia have disrupted a major phishing-as-a-service (PhaaS) and initial access broker (IAB) operation that supplied thousands of threat...
The EU has cemented ties with Ukraine on cybersecurity cooperation, with a new formal agreement designed to improve information sharing...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infocontec -- solarview_compact_firmwareAn issue in Contec SolarView Compact v.6.0 and before allows...
The threat actors behind a new ransomware group called Hunters International have acquired the source code and infrastructure from the...
Malaysian law enforcement authorities have announced the takedown of a phishing-as-a-service (PhaaS) operation called BulletProofLink. The Royal Malaysia Police said...
Cybersecurity researchers have discovered what they say is malicious cyber activity orchestrated by two prominent Chinese nation-state hacking groups targeting...
Cybersecurity researchers have warned about a Windows version of a wiper malware that was previously observed targeting Linux systems in...
Security researchers have tracked a new campaign from Imperial Kitten targeting transportation, logistics, and technology firms. Imperial Kitten is also...