Email Bombing and Teams Vishing: The Latest Tactics from Russian Ransomware Groups
Email bombing and Teams vishing are tactics employed by Russian ransomware groups to gain unauthorized access to corporate systems. Security...
Email bombing and Teams vishing are tactics employed by Russian ransomware groups to gain unauthorized access to corporate systems. Security...
In the ever-evolving landscape of data protection, many European privacy teams are facing significant challenges. A recent report highlights understaffing...
Oracle will address 320 security vulnerabilities in its January Patch Update, affecting a wide range of products and services. Software...
The new Mirai malware variant, known as Murdoc_Botnet, is specifically targeting AVTECH cameras and Huawei routers, taking advantage of known...
Phishing risks are escalating as security researchers reveal how Zendesk subdomains can be exploited for malicious attacks. A recent analysis...
In 2024, GDPR fines reached €1.2bn ($1.26bn), marking a notable 33% decrease from the previous year as reported by DLA...
The UK government’s introduction of a digital ID wallet is met with both excitement and apprehension about security and privacy....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded in the past week. In some...
The Otelier breach has compromised the personal data of hotel guests, highlighting vulnerabilities in the hospitality industry. Customers of renowned...
In response to significant cyber intrusions, the US has imposed sanctions on Chinese state cyber actors involved in breaches of...
Hewlett Packard Enterprise (HPE) is currently investigating serious claims made by hacker IntelBroker, who alleges a data breach involving sensitive...
Ukraine's state registers have been fully restored following a significant cyber-attack attributed to Russia, ensuring data security and operational integrity....
A former CIA analyst has admitted to sharing top secret documents on social media, raising serious national security concerns. A...
The DONOT APT group from India is exploiting a malicious Android application disguised as a chat platform for intelligence gathering....
On June 24, we observed a new campaign distributing a stealer targeting Mac users via malicious Google ads for the...
Competition between stealers for macOS is heating up, with a new malvertising campaign luring Mac users via a fraudulent advert...
Multiple vulnerabilities were identified in Fortinet Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege,...
GoDaddy's multiple data breaches reveal critical security shortcomings, prompting an FTC investigation that mandates significant improvements in their security practices....
The EU is taking significant steps to improve healthcare cybersecurity with the launch of a new Cybersecurity Support Centre by...
In an era where email security is paramount, cybercriminals are leveraging innovative techniques such as image-based malware and GenAI to...
Middle Eastern real estate fraud is surging as scammers exploit online listings, taking advantage of potential buyers' trust and urgency....
Compliance with DORA is leading UK and EU businesses to face costs exceeding €1 million, prompting concerns within the financial...
In a proactive move, President Joe Biden has strengthened the software supply chain security requirements just before the transition of...
A new hacking group has exposed the configuration files of 15,000 Fortinet firewalls, raising serious security concerns. A new threat...