The Week in Ransomware – April 14th 2023 – A Focus on Stolen Data
It has been mostly a quiet week regarding ransomware, with only a few bits of info released on older attacks...
It has been mostly a quiet week regarding ransomware, with only a few bits of info released on older attacks...
The Federal Security Service of the Russian Federation (FSB) has accused the United States and other NATO countries of launching...
Google on Friday released out-of-band updates to resolve an actively exploited zero-day flaw in its Chrome web browser, making it...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The Russia-linked APT29 (aka Cozy Bear) threat actor has been attributed to an ongoing cyber espionage campaign targeting foreign ministries...
Open source media player software provider Kodi has confirmed a data breach after threat actors stole the company's MyBB forum...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, based...
In today's fast-paced and ever-changing digital landscape, businesses of all sizes face a myriad of cybersecurity threats. Putting in place...
A new Python-based credential harvester and SMTP hijacking tool named ‘Legion’ is being sold on Telegram that targets online email...
Dutch Police is sending emails to former RaidForums members, asking them to delete stolen data and stop illegal cyber activities...
Europol and Eurojust announced today the arrest of five individuals believed to be part of a massive online investment fraud ring...
Microsoft is warning of a phishing campaign targeting accounting firms and tax preparers with remote access malware allowing initial access...
WhatsApp announced today the introduction of several new security features, one of them dubbed "Device Verification" and designed to provide...
Poland's Military Counterintelligence Service and its Computer Emergency Response Team have linked APT29 state-sponsored hackers, part of the Russian government's...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Google on Thursday outlined a set of initiatives aimed at improving the vulnerability management ecosystem and establishing greater transparency measures...
Cybersecurity researchers have detailed the tactics of a "rising" cybercriminal gang called "Read The Manual" (RTM) Locker that functions as...
Popular instant messaging app WhatsApp on Thursday announced a new account verification feature that ensures that malware running on a...
The North Korean threat actor known as the Lazarus Group has been observed shifting its focus and rapidly evolving its...
An emerging Python-based credential harvester and a hacking tool named Legion is being marketed via Telegram as a way for...
The Transparent Tribe threat actor has been linked to a set of weaponized Microsoft Office documents in attacks targeting the...
Shadow APIs are a growing risk for organizations of all sizes as they can mask malicious behavior and induce substantial...
OpenAI, the company behind the massively popular ChatGPT AI chatbot, has launched a bug bounty program in an attempt to...
A Kyocera Android printing app is vulnerable to improper intent handling, allowing other malicious applications to abuse the flaw to download...