CISA Warns of Critical ICS Flaws in Hitachi, mySCADA, ICL, and Nexx Products
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws...
Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked on the code-sharing...
A joint international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of...
Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle the abuse of...
Telegram has become the working ground for the creators of phishing bots and kits looking to market their products to...
The Medusa ransomware gang has claimed a cyberattack on the Open University of Cyprus (OUC), which caused severe disruptions of...
Security researchers discovered a new malicious browser extension called Rilide, that targets Chromium-based products like Google Chrome, Brave, Opera, and...
The UK's Criminal Records Office (ACRO) has finally confirmed, after weeks of delaying issuing a statement, that online portal issues...
Taiwanese PC parts maker MSI (Micro-Star International) has been listed on the extortion portal of a new ransomware gang known...
Microsoft, Fortra, and the Health Information Sharing and Analysis Center (Health-ISAC) have announced a broad legal crackdown against servers hosting...
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info grinnellplans -- grinnellplans A vulnerability...
A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in the sale of...
Critical infrastructure attacks are a preferred target for cyber criminals. Here's why and what's being done to protect them. What...
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
The developers of the Typhon info-stealer announced on a dark web forum that they have updated the malware to a...
A new dark web marketplace called STYX launched earlier this year and appears to be on its way to becoming a...
The police in Spain have arrested José Luis Huertas (aka "Alcaseca", "Mango", “chimichuri”), a 19-year-old regarded as the most dangerous...
Multiple vulnerabilities discovered Nexx smart devices can be exploited to control garage doors, disable home alarms, or smart plugs. There are...
Biometric authentication is often thought of as nearly impossible to steal or fake, a perfect addition to your cybersecurity arsenal....
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
Google is enacting a new data deletion policy for Android apps that allow account creation to also offer users with...
High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info grinnellplans -- grinnellplans A vulnerability...
Clouded vision# CTI systems are confronted with some major issues ranging from the size of the collection networks to their...
Portuguese users are being targeted by a new malware codenamed CryptoClippy that's capable of stealing cryptocurrency as part of a...