Criminal IP Teams Up with PolySwarm to Strengthen Threat Detection
In today's ever-evolving digital landscape, the significance of effective malware detection remains paramount. With the escalating threat of cyberattacks, cybersecurity...
In today's ever-evolving digital landscape, the significance of effective malware detection remains paramount. With the escalating threat of cyberattacks, cybersecurity...
Image: Midjourney The Colorado Department of Health Care Policy & Financing (HCPF) is alerting more than four million individuals of a...
Researchers discovered 120,000 infected systems that contained credentials for cybercrime forums. Many of the computers belong to hackers, the researchers...
The Monti ransomware gang has returned, after a two-month break from publishing victims on their data leak site, using a new...
The FBI is warning of a new tactic used by cybercriminals where they promote malicious "beta" versions of cryptocurrency investment...
Updated: Added further information from Akihirah about the sale of the database. The Discord.io custom invite service has temporarily shut down...
The FBI is warning of an increase in scammers pretending to be recovery companies that can help victims of cryptocurrency...
Police have taken down a Lolek bulletproof hosting service used by criminals to launch cyber-attacks across the world.The takedown was...
Alberta Dental Service Corporation (ADSC) has revealed that nearly 1.47 million individuals have been affected by a data breach that...
A series of security vulnerabilities have been discovered in CyberPower’s PowerPanel Enterprise Data Center Infrastructure Management (DCIM) platform and Dataprobe’s...
Microsoft researchers have identified multiple high-severity vulnerabilities that could enable threat actors to shut down power plants.The flaws were discovered...
Cybersecurity researchers have published a new analysis of the elusive Gigabud banking malware. Originating as an Android Remote Access Trojan (RAT),...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Info phoenixcontact -- wp_6xxx_series In PHOENIX CONTACTs WP 6xxx series web panels...
A new remote access trojan (RAT) called QwixxRAT is being advertised for sale by its threat actor through Telegram and...
E-commerce sites using Adobe's Magento 2 software are the target of an ongoing campaign that has been active since at...
The Indian President Droupadi Murmu on Friday granted assent to the Digital Personal Data Protection Bill (DPDPB) after it was...
Users in Latin America (LATAM) are the target of a financial malware called JanelaRAT that's capable of capturing sensitive information...
Why SaaS Security Is a Challenge# In today's digital landscape, organizations are increasingly relying on Software-as-a-Service (SaaS) applications to drive...
Germany's Federal Office for the Protection of the Constitution (BfV) has warned of cyber attacks targeting Iranian persons and organizations...
Every year local government bodies or councils across Britain contact residents, asking them to update their voter details on the electoral register if...
A team of researchers from UC Irvine and Tsinghua University has developed a new powerful cache poisoning attack named 'MaginotDNS,'...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infoyunyecms -- yunyecmsSQL injection vulnerability in yunyecms 2.0.2 allows remote attackers to...
The year is 2023 and there still are some people using Internet Explorer on planet Earth. More shocking perhaps, is...
Ford is warning of a buffer overflow vulnerability in its SYNC3 infotainment system used in many Ford and Lincoln vehicles,...