Hackers start abusing Action1 RMM in ransomware attacks
Security researchers are warning that cybercriminals are increasingly using the Action1 remote access software for persistence on compromised networks and...
Security researchers are warning that cybercriminals are increasingly using the Action1 remote access software for persistence on compromised networks and...
Source: NCR Aloha NCR is suffering an outage on its Aloha point of sale platform after being hit by an...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Europol and Eurojust announced today the arrest of five individuals believed to be part of a massive online investment fraud ring...
Cybersecurity firm Darktrace says it found no evidence that the LockBit ransomware gang breached its network after the group added...
Google has released an emergency Chrome security update to address the first zero-day vulnerability exploited in attacks since the start of the year. "Google...
The Vice Society ransomware gang is deploying a new, rather sophisticated PowerShell script to automate data theft from compromised networks....
It has been mostly a quiet week regarding ransomware, with only a few bits of info released on older attacks...
The Federal Security Service of the Russian Federation (FSB) has accused the United States and other NATO countries of launching...
Google on Friday released out-of-band updates to resolve an actively exploited zero-day flaw in its Chrome web browser, making it...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
The Russia-linked APT29 (aka Cozy Bear) threat actor has been attributed to an ongoing cyber espionage campaign targeting foreign ministries...
Open source media player software provider Kodi has confirmed a data breach after threat actors stole the company's MyBB forum...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, based...
In today's fast-paced and ever-changing digital landscape, businesses of all sizes face a myriad of cybersecurity threats. Putting in place...
A new Python-based credential harvester and SMTP hijacking tool named ‘Legion’ is being sold on Telegram that targets online email...
Poland's Military Counterintelligence Service and its Computer Emergency Response Team have linked APT29 state-sponsored hackers, part of the Russian government's...
Dutch Police is sending emails to former RaidForums members, asking them to delete stolen data and stop illegal cyber activities...
Europol and Eurojust announced today the arrest of five individuals believed to be part of a massive online investment fraud ring...
Microsoft is warning of a phishing campaign targeting accounting firms and tax preparers with remote access malware allowing initial access...
WhatsApp announced today the introduction of several new security features, one of them dubbed "Device Verification" and designed to provide...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cybersecurity researchers have detailed the tactics of a "rising" cybercriminal gang called "Read The Manual" (RTM) Locker that functions as...
Google on Thursday outlined a set of initiatives aimed at improving the vulnerability management ecosystem and establishing greater transparency measures...