Ransomware Costs Financial Services $32bn in Five Years
Global financial services organizations have lost over $32bn in downtime since 2018 due to ransomware breaches, a new report has...
Global financial services organizations have lost over $32bn in downtime since 2018 due to ransomware breaches, a new report has...
A new threat actor group has been observed conducting a series of cyber-attacks targeting government entities, military organizations and civilian...
Windows users have been targeted again by the sophisticated malware known as LokiBot, which is spreading through malicious Office documents. According...
A generative AI tool, WormGPT, has emerged as a powerful weapon in the hands of cyber-criminals, specifically for launching business...
Trend Micro has discovered a sample of Shadowpad, a sophisticated backdoor used by various Chinese-sponsored threat actors, in an application...
Researchers at the RWTH Aachen University in Germany published a study revealing that tens of thousands of container images hosted...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infosem-cms -- semcmsFile Upload vulnerability in SEMCMS PHP 3.7 allows remote attackers...
Ukraine's Computer Emergency Response Team (CERT-UA) is warning that the Gamaredon hacking operates in rapid attacks, stealing data from breached...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infosem-cms -- semcmsFile Upload vulnerability in SEMCMS PHP 3.7 allows remote attackers...
Shutterfly, an online retail and photography manufacturing platform, is among the latest victims hit by Clop ransomware. Over the last few months,...
There are many avenues of attack that a threat actor can take. One that has been increasing in recent years...
Since at least May 2021, stealthy Linux malware called AVrecon was used to infect over 70,000 Linux-based small office/home office...
In the fast-paced world of cybersecurity, strategic technical partnerships are crucial for staying ahead of emerging threats. Criminal IP, a...
The All-In-One Security (AIOS) WordPress security plugin, used by over a million WordPress sites, was found to be logging plaintext...
Conor Brian Fitzpatrick, aka Pompompurin, the owner of the notorious BreachForums (aka Breached) hacking forum, has pleaded guilty to hacking...
Image: Bing Create The administrators of the Genesis Market for stolen credentials announced on a hacker forum that they sold...
Colorado State University (CSU) has confirmed that the Clop ransomware operation stole sensitive personal information of current and former students...
Rockwell Automation says a new remote code execution (RCE) exploit linked to an unnamed Advanced Persistent Threat (APT) group could...
High VulnerabilitiesPrimary Vendor -- ProductDescriptionPublishedCVSS ScoreSource & Patch Infosem-cms -- semcmsFile Upload vulnerability in SEMCMS PHP 3.7 allows remote attackers...
What's old is new again, with researchers seeing a threefold increase in malware distributed through USB drives in the first...
​Cybersecurity researchers and threat actors are targeted by a fake proof of concept (PoC) CVE-2023-35829 exploit that installs a Linux...
The Cisco SD-WAN vManage management software is impacted by a flaw that allows an unauthenticated, remote attacker to gain read...
The source code for the BlackLotus UEFI bootkit has leaked online, allowing greater insight into a malware that has caused...
Zimbra urged admins today to manually fix a zero-day vulnerability actively exploited to target and compromise Zimbra Collaboration Suite (ZCS)...