Clop ransomware now uses torrents to leak data and evade takedowns
The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in...
The Clop ransomware gang has once again altered extortion tactics and is now using torrents to leak data stolen in...
The Colorado Department of Higher Education (CDHE) discloses a massive data breach impacting students, past students, and teachers after suffering...
A team of researchers from British universities has trained a deep learning model that can steal data from keyboard keystrokes...
The Google Play store was infiltrated by 43 Android applications with 2.5 million installs that secretly displayed advertisements while a...
The North Korean state-sponsored hacking group ScarCruft has been linked to a cyberattack on the IT infrastructure and email server...
The UK Electoral Commission disclosed a massive data breach exposing the personal information of anyone who registered to vote in...
Researchers from the Technical University of Berlin have developed a method to jailbreak the AMD-based infotainment systems used in all...
Hackers are increasingly abusing the legitimate Cloudflare Tunnels feature to create stealthy HTTPS connections from compromised devices, bypass firewalls, and...
Microsoft today released a defense-in-depth update for Microsoft Office that prevents exploitation of a remote code execution (RCE) vulnerability tracked...
Researchers have discovered a new and powerful transient execution attack called 'Inception' that can leak privileged secrets and data using...
Microsoft's Visual Studio Code (VS Code) code editor and development environment contains a flaw that allows malicious extensions to retrieve...
A joint operation between Interpol and cybersecurity firms has led to an arrest and shutdown of the notorious 16shop phishing-as-a-service...
A senior research scientist at Google has devised new CPU attacks to exploit a vulnerability dubbed Downfall that affects multiple...
Microsoft has released monthly security update for their products: Vulnerable ProductRisk LevelImpactsNotesBrowser Medium RiskSecurity Restriction Bypass Microsoft Office Extremely High RiskRemote Code...
Cybersecurity experts have discovered a new adware campaign specifically targeting Korean Android users. The discovery by McAfee’s Mobile Research Team shed...
A leading Spanish research institute has become the latest organization in the country to come under cyber-attack from Russia, after...
The US Federal Bureau of Investigation (FBI) has issued a warning concerning a growing wave of financial fraud within the...
A widespread cyber-attack on hospital computer systems has caused significant disruptions across the United States, leading to the closure of...
The majority (66%) of UK websites are unable to block simple bot attacks, exposing their businesses to fraud, account compromise...
UK organizations lost billions in data breaches between 2019 and 2022, with hundreds of millions of their customers suffering compromise...
Identity theft has established itself as the main initial access method for threat actors, according to CrowdStrike.In its 2023 Threat...
Security researchers have discovered a likely North Korean cyber-espionage campaign targeting the IT network of a Russian manufacturer of intercontinental...
Law firm Morgan & Morgan has lodged a class-action lawsuit against Tampa General Hospital on behalf of three victims affected...
The UK’s Electoral Commission has revealed it has been the victim of a “complex cyber-attack,” exposing the personal details of...