Russian Cyber Adversary BlueCharlie Alters Infrastructure in Response to Disclosures
A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group is actively modifying its infrastructure in...
A Russa-nexus adversary has been linked to 94 new domains, suggesting that the group is actively modifying its infrastructure in...
In recent years the rise of illicit activities conducted within online messaging platforms has become a growing concern for countless...
Services offered by an obscure Iranian company known as Cloudzy are being leveraged by multiple threat actors, including cybercrime groups...
Interrupted classes, disrupted planning, and postponed events – IT outages have a big impact on modern university life. But as...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) warned today of state hackers exploiting two flaws in Ivanti's Endpoint Manager...
American apparel retailer Hot Topic is notifying customers about multiple cyberattacks between February 7 and June 21 that resulted in...
In the wake of WormGPT, a ChatGPT clone trained on malware-focused data, a new generative artificial intelligence hacking tool called...
Security researchers are warning of increased phishing activity that abuses Google Accelerated Mobile Pages (AMP) to bypass email security measures...
Chinese state-sponsored hackers have been targeting industrial organizations with new malware that can steal data from air-gapped systems. Air-gapped systems...
Cybersecurity researchers have unearthed a Python variant of a stealer malware NodeStealer that's equipped to fully take over Facebook business...
Advanced persistent threat (APT) actors exploited a recently disclosed critical flaw impacting Ivanti Endpoint Manager Mobile (EPMM) as a zero-day...
An NHS trust has been reprimanded by the UK’s data protection regulator after it was discovered that staff had been...
Security researchers have uncovered new loader malware under active development which uses multiple mechanisms to evade detection.Proofpoint said it detected...
The boss of one of Europe’s largest outsourcing companies has announced his retirement, several months after the firm suffered a...
A new report has shed light on critical cloud risks, with a focus on the growing threat of cloud tech...
A new and sophisticated malware campaign named “P2Pinfect” has been observed targeting publicly-accessible deployments of the Redis data store.According to a...
Canon has raised concerns over potential security risks linked to the disposal of inkjet printers. In a security advisory published on...
Unit 42 researchers have uncovered another phishing campaign designed to take over Facebook business accounts using a newly identified infostealer...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infobiltay_technology -- scienta Improper Neutralization of Special Elements used in an SQL...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infobiltay_technology -- scienta Improper Neutralization of Special Elements used in an SQL...
This blog post was authored by Malwarebytes' Roberto Santos and Fortinet's Hossein Jazi While the official conflict between Russia and...
Online criminals are notorious for lurking on social media sites and tricking users into visiting malicious links. We recently observed a scheme where Facebook users are...
This article is based on research by Marcelo Rivero, Malwarebytes' ransomware specialist, who monitors information published by ransomware gangs on...
Web search is about to embark on a new journey thanks to artificial intelligence technology that online giants such as Microsoft and...