Researchers Expose Space Pirates’ Cyber Campaign Across Russia and Serbia
The threat actor known as Space Pirates has been linked to attacks against at least 16 organizations in Russia and...
The threat actor known as Space Pirates has been linked to attacks against at least 16 organizations in Russia and...
Various European customers of different banks are being targeted by an Android banking trojan called SpyNote as part of an...
Data Security Posture Management is an approach to securing cloud data by ensuring that sensitive data always has the correct...
A nation-state actor with links to China is suspected of being behind a series of attacks against industrial organizations in...
Security researchers have uncovered an ongoing attack campaign dubbed STARK#MULE, which employs US military-related documents as lures to deliver malware...
A Chinese threat actor that compromised federal networks by targeting Barracuda security appliances did so in part thanks to a...
Cybersecurity researchers have uncovered crucial insights into the tactics, techniques and procedures (TTPs) employed by the threat actor APT31 (also known...
Against a backdrop of global cybersecurity workforce gap of 3.4 million people, the White House today announced its new National...
The Android spyware known as SpyNote has been targeting financial institutions since late 2022 while expanding its capabilities to carry...
The UK’s Ministry of Defence (MoD) has launched its Secure by Design initiative, which is to transform how cybersecurity is...
Website of Israel's largest oil refinery operator, BAZAN Group is inaccessible from most parts of the world as threat actors claim to have...
Hackers are using a fake Android app named 'SafeChat' to infect devices with spyware malware that steals call logs, texts,...
Canon is warning users of home, office, and large format inkjet printers that their Wi-Fi connection settings stored in the...
Threat actors are actively targeting exposed instances of SSH and Redis Redis open-source data store with a peer-to-peer self-replicating worm...
Google has published its annual 0-day vulnerability report, presenting in-the-wild exploitation stats from 2022 and highlighting a long-standing problem in...
Hackers are actively exploiting a 'BleedingPipe' remote code execution vulnerability in Minecraft mods to run malicious commands on servers and...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infooliva_expertise -- oliva_expertise_eks Improper Neutralization of Special Elements used in an SQL...
The P2PInfect peer-to-peer (P2) worm has been observed employing previously undocumented initial access methods to breach susceptible Redis servers and...
Threat actors associated with the hacking crew known as Patchwork have been spotted targeting universities and research organizations in China...
More details have emerged about a botnet called AVRecon, which has been observed making use of compromised small office/home office...
Demand for Virtual CISO services is soaring. According to Gartner, the use of vCISO services among small and mid-size businesses...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday disclosed details of a "novel persistent backdoor" called SUBMARINE deployed...
The threat actors linked to the malware loader known as IcedID have made updates to the BackConnect (BC) module that's...
Increasing cyber threats and attacks have made protecting organizational data a paramount concern for businesses of all sizes. A group...