Hacktivists fund their operations using common cybercrime tactics
Hacktivist groups that operate for political or ideological motives employ a broad range of funding methods to support their operations....
Hacktivist groups that operate for political or ideological motives employ a broad range of funding methods to support their operations....
The privacy-focused search engine Brave Search has finally introduced its own, independent image and video search capabilities, breaking free from...
The enormous global costs of ransomware attacks on the manufacturing sector have been laid bare in a new analysis by...
Security vendor Ivanti has disclosed yet another critical vulnerability in its products, linked to a previous zero-day that was exploited...
With the deployment of software-as-a-service tools, like Workday and Salesforce to name a few, workers are now spending more time...
Several members of an organized crime group (OGC) have been sentenced after police secretly monitored tens of thousands of messages...
Around 600 global Citrix servers have been compromised by a zero-day exploit enabling webshells to be installed, according to a non-profit...
Humans cannot detect deepfake speech 27% the time, researchers from University College London (UCL) have found during a recent study.The...
Microsoft Threat Intelligence has recently detected a series of highly targeted social engineering attacks employing credential theft phishing lures delivered...
Threat intelligence experts from Group-IB have shed light on the hacktivist collective known as Mysterious Team Bangladesh.In a report published...
Cisco Talos has published a list of numerous vulnerabilities in small and home office (SOHO) and industrial wireless routers.In their...
Cyber-attacks against government agencies and public sector services are up 40% in the second quarter of 2023 compared to the...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infobiltay_technology -- scienta Improper Neutralization of Special Elements used in an SQL...
Threat actors are leveraging a technique called versioning to evade Google Play Store's malware detections and target Android users. "Campaigns...
Hundreds of Citrix NetScaler ADC and Gateway servers have been breached by malicious actors to deploy web shells, according to...
The frequency and complexity of cyber threats are constantly evolving. At the same time, organizations are now collecting sensitive data...
Cybersecurity researchers have discovered a new version of malware called Rilide that targets Chromium-based web browsers to steal sensitive data...
Ransomware attacks have shown no signs of slowing down in 2023. A new report from the Malwarebytes Threat Intelligence team...
Cybersecurity researchers have discovered a bypass for a recently fixed actively exploited vulnerability in some versions of Ivanti Endpoint Manager...
Microsoft on Wednesday disclosed that it identified a set of highly targeted social engineering attacks mounted by a Russian nation-state...
A hacktivist group known as Mysterious Team Bangladesh has been linked to over 750 distributed denial-of-service (DDoS) attacks and 78...
Microsoft is warning of the threat malicious cyber actors pose to stadium operations, warning that the cyber risk surface of...
Hackers exploited a zero-day vulnerability in Salesforce's email services and SMTP servers to launch a sophisticated phishing campaign targeting valuable...
Researchers have discovered a new post-exploitation technique in Amazon Web Services (AWS) that allows hackers to use the platform's System...