New P2PInfect Worm Targets Redis Servers with Undocumented Breach Methods
The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible Redis servers and...
The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible Redis servers and...
Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research organizations in China...
More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home office...
Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small and mid-size businesses...
Increasing cyber threats and attacks have made protecting organizational data a paramount concern for businesses of all sizes. A group...
An ongoing cyber attack campaign has set its sights on Korean-speaking individuals by employing U.S. Military-themed document lures to trick...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a "novel persistent backdoor" called SUBMARINE deployed...
The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC) module that's...
Multiple security vulnerabilities have been disclosed in the Ninja Forms plugin for WordPress that could be exploited by threat actors...
Threat actors are creating fake websites hosting trojanized software installers to trick unsuspecting users into downloading a downloader malware called...
A new Android malware strain called CherryBlos has been observed making use of optical character recognition (OCR) techniques to gather...
Ivanti has disclosed yet another security flaw impacting Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core, that it said...
Apple has announced plans to require developers to submit reasons to use certain APIs in their apps starting later this...
Two new Android malware families named 'CherryBlos' and 'FakeTrade' were discovered on Google Play, aiming to steal cryptocurrency credentials and...
CISA warned today of the significant breach risks linked to insecure direct object reference (IDOR) vulnerabilities impacting web applications in...
The Hawaiʻi Community College has admitted that it paid a ransom to ransomware actors to prevent the leaking of stolen...
Microsoft Edge web browser has been displaying security warnings after Twitter changed its name to 'X'. Amid its rapid rebranding...
The Abyss Locker operation is the latest to develop a Linux encryptor to target VMware's ESXi virtual machines platform in...
Ivanti has fixed another vulnerability in the Endpoint Manager Mobile software (formerly MobileIron Core), exploited as a zero-day to breach the IT systems...
With ransom payments declining, ransomware gangs are evolving their extortion tactics to utilize new methods to pressure victims. This was...
CISA says new malware known as Submarine was used to backdoor Barracuda ESG (Email Security Gateway) appliances on federal agencies'...
Another 8–11 million individuals are believed to have had their personal information compromised by the Clop ransomware gang after a...
A US Senator has demanded that the Whitehouse holds Microsoft to account for a Chinese cyber campaign that compromised US...
North Korea’s infamous Lazarus hacking group has been linked to two new attacks on cryptocurrency firms which led to the...