Critical Ruckus RCE flaw exploited by new DDoS botnet malware
A new malware botnet named 'AndoryuBot' is targeting a critical-severity flaw in the Ruckus Wireless Admin panel to infect unpatched...
A new malware botnet named 'AndoryuBot' is targeting a critical-severity flaw in the Ruckus Wireless Admin panel to infect unpatched...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
U.S. authorities have announced the seizure of 13 internet domains that offered DDoS-for-hire services to other criminal actors. The takedown...
A gambling company in the Philippines was the target of a China-aligned threat actor as part of a campaign that...
In the fast-paced cybersecurity landscape, product security takes center stage. DevSecOps swoops in, seamlessly merging security practices into DevOps, empowering...
Iranian nation-state groups have now joined financially motivated actors in actively exploiting a critical flaw in PaperCut print management software,...
The advanced persistent threat (APT) actor known as SideWinder has been accused of deploying a backdoor in attacks directed against...
Cybersecurity researchers have shed light on a new ransomware strain called CACTUS that has been found to leverage known flaws...
As QR codes continue to be heavily used by legitimate organizations—from Super Bowl advertisements to enforcing parking fees and fines,...
Data theft is the act of stealing data stored in business databases, endpoints, and servers. The stolen data can include...
Intel is investigating the leak of alleged private keys used by the Intel Boot Guard security feature, potentially impacting its...
cyberstress.org seizure banner (DOJ) The U.S. Justice Department announced today the seizure of 13 more domains linked to DDoS-for-hire platforms,...
Microsoft says Iranian state-backed hackers have joined the ongoing assault targeting vulnerable PaperCut MF/NG print management servers. These groups are tracked...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Are you concerned about ransomware attacks? You're not alone. In recent years, these attacks have become increasingly common and can...
The suspected Pakistan-aligned threat actor known as SideCopy has been observed leveraging themes related to the Indian military research organization...
The threat actors behind the ransomware attack on Taiwanese PC maker MSI last month have leaked the company's private code...
Digital storage giant Western Digital confirmed that an "unauthorized third party" gained access to its systems and stole personal information...
Threat hunting is an essential component of your cybersecurity strategy. Whether you're getting started or in an advanced state, this...
An ongoing phishing campaign with invoice-themed lures is being used to distribute the SmokeLoader malware in the form of a...
A new ransomware operation called Cactus has been exploiting vulnerabilities in VPN appliances for initial access to networks of “large...
Finish newspaper Helsinin Sanomat has created a custom Counter-Strike: Global Offensive (CS:GO) map explicitly made to bypass Russian news censorship...
Western Digital has taken its store offline and sent customers data breach notifications after confirming that hackers stole sensitive personal...
The new Akira ransomware operation has slowly been building a list of victims as they breach corporate networks worldwide, encrypt...