ScanSource says ransomware attack behind multi-day outages
Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and...
Technology provider ScanSource has announced it has fallen victim to a ransomware attack impacting some of its systems, business operations, and...
Cybercriminals are starting to target Microsoft's VSCode Marketplace, uploading three malicious Visual Studio extensions that Windows developers downloaded 46,600 times....
Image: Bing Create A new ransomware operation is hacking Zimbra servers to steal emails and encrypt files. However, instead of...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
A hacking group dubbed OilAlpha with suspected ties to Yemen's Houthi movement has been linked to a cyber espionage campaign...
Software is rarely a one-and-done proposition. In fact, any application available today will likely need to be updated – or...
Cybersecurity researchers have unearthed previously undocumented attack infrastructure used by the prolific state-sponsored group SideWinder to strike entities located in...
A financially motivated cyber actor has been observed abusing Microsoft Azure Serial Console on virtual machines (VMs) to install third-party...
The second generation version of Belkin's Wemo Mini Smart Plug has been found to contain a buffer overflow vulnerability that...
A Russian national has been charged and indicted by the U.S. Department of Justice (DoJ) for launching ransomware attacks against...
Image: Gaelle Marcel Kiddowares 'Parental Control – Kids Place' app for Android is impacted by multiple vulnerabilities that could enable attackers...
Geacon, a Go-based implementation of the beacon from the widely abused penetration testing suite Cobalt Strike, is being used more and more...
As ransomware attacks continue to wreak havoc on organizations worldwide, many official standards and regulations have been established to address...
The U.S. Justice Department has filed charges against a Russian citizen named Mikhail Pavlovich Matveev (also known as Wazawaka, Uhodiransomwar, m1x,...
A Chinese state-sponsored hacking group named "Camaro Dragon" infects residential TP-Link routers with a custom "Horse Shell" malware used to...
A financially motivated cybergang tracked by Mandiant as 'UNC3944' is using phishing and SIM swapping attacks to hijack Microsoft Azure...
Cybersecurity researchers and IT admins have raised concerns over Google's new ZIP and MOV Internet domains, warning that threat actors...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The Chinese nation-state actor known as Mustang Panda has been linked to a new set of sophisticated and targeted attacks...
Ransomware affiliates associated with the Qilin ransomware-as-a-service (RaaS) scheme earn anywhere between 80% to 85% of each ransom payment, according...
Operational technology (OT) cybersecurity is a challenging but critical aspect of protecting organizations' essential systems and resources. Cybercriminals no longer...
The threat actors behind the CopperStealer malware resurfaced with two new campaigns in March and April 2023 that are designed...
A Golang implementation of Cobalt Strike called Geacon is likely to garner the attention of threat actors looking to target...
i100 industry team and NCSC collaborate on refreshed guidance for boards Originally published in 2019, the https://www.ncsc.gov.uk/collection/board-toolkit" target="_self">NCSC’s cyber security...