Beware: 1,000+ Fake Cryptocurrency Sites Trap Users in Bogus Rewards Scheme
A previously undetected cryptocurrency scam has leveraged a constellation of over 1,000 fraudulent websites to ensnare users into a bogus...
A previously undetected cryptocurrency scam has leveraged a constellation of over 1,000 fraudulent websites to ensnare users into a bogus...
Researchers at the North Carolina State University Raleigh have discovered a privacy risk in the Strava app's heatmap feature that could...
Update 6/11/23: Fortinet statement added below. Fortinet has released new Fortigate firmware updates that fix an undisclosed, critical pre-authentication remote...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level...
Vietnamese public companies have been targeted as part of an ongoing campaign that deploys a novel backdoor called SPECTRALVIPER. "SPECTRALVIPER...
Progress Software, the company behind the MOVEit Transfer application, has released patches to address brand new SQL injection vulnerabilities affecting...
APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level...
Australian law firm HWL Ebsworth confirmed to local media outlets that its network was hacked after the ALPHV ransomware gang...
Image: City Suites The University of Manchester warns staff and students that they suffered a cyberattack where threat actors likely stole...
Progress Software warned customers today of newly found critical SQL injection vulnerabilities in its MOVEit Transfer managed file transfer (MFT)...
Russian nationals Alexey Bilyuchenko and Aleksandr Verner have been charged with the 2011 hacking of the leading cryptocurrency exchange Mt....
A group of Ukrainian hackers known as the Cyber.Anarchy.Squad claimed an attack that took down Russian telecom provider Infotel JSC...
The week was dominated by fallout over the MOVEit Transfer data-theft attacks, with the Clop ransomware gang confirming that they...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The threat actor known as Asylum Ambuscade has been observed straddling cybercrime and cyber espionage operations since at least early...
Banking and financial services organizations are the targets of a new multi-stage adversary-in-the-middle (AitM) phishing and business email compromise (BEC)...
The way we work has undergone a dramatic transformation in recent years. We now operate within digital ecosystems, where remote...
APIs, more formally known as application programming interfaces, empower apps and microservices to communicate and share data. However, this level...
A new custom backdoor dubbed Stealth Soldier has been deployed as part of a set of highly-targeted espionage attacks in...
Image: Bing Create The Royal ransomware gang has begun testing a new encryptor called BlackSuit that shares many similarities with...
Let’s talk about cybersecurity’s silo problem. First, industry divides are weighing on practitioners. According to ISSA, 77% of infosec pros...
A hacking group tracked as 'Asylum Ambuscade' was observed in recent attacks targeting small to medium-sized companies worldwide, combining cyber...