Operation Soft Cell: Chinese Hackers Breach Middle East Telecom Providers
Telecommunication providers in the Middle East are the subject of new cyber attacks that commenced in the first quarter of...
Telecommunication providers in the Middle East are the subject of new cyber attacks that commenced in the first quarter of...
In 2022 alone, global cyberattacks increased by 38%, resulting in substantial business loss, including financial and reputational damage. Meanwhile, corporate...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
German and South Korean government agencies have warned about cyber attacks mounted by a threat actor tracked as Kimsuky using...
Proof-of-concept exploits for vulnerabilities in Netgear’s Orbi 750 series router and extender satellites have been released, with one flaw a...
A new credit card stealing hacking campaign is doing things differently than we have seen in the past by hiding...
On the first day of Pwn2Own Vancouver 2023, security researchers successfully demoed Tesla Model 3, Windows 11, and macOS zero-day...
Fresh produce giant Dole Food Company has confirmed threat actors behind a February ransomware attack have accessed the information of...
A trojanized version of the legitimate ChatGPT extension for Chrome is gaining popularity on the Chrome Web Store, accumulating over...
A joint cybersecurity advisory from the German Federal Office for the Protection of the Constitution (BfV) and the National Intelligence...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released eight Industrial Control Systems (ICS) advisories on Tuesday, warning of...
Amid the ongoing war between Russia and Ukraine, government, agriculture, and transportation organizations located in Donetsk, Lugansk, and Crimea have...
Active Directory (AD) is a powerful authentication and directory service used by organizations worldwide. With this ubiquity and power comes...
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in...
The North Korean advanced persistent threat (APT) actor dubbed ScarCruft is using weaponized Microsoft Compiled HTML Help (CHM) files to...
The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in...
The NuGet repository is the target of a new "sophisticated and highly-malicious attack" aiming to infect .NET developer systems with...
Coinbase wallet and other decentralized crypto apps (dapps) were found to be vulnerable to "red pill attacks," a method that...
Another ransomware operation, the LockBit gang, now threatens to leak what it describes as files stolen from the City of Oakland's...
The Clop ransomware gang claims to have attacked Saks Fifth Avenue on its dark web leak site. The cyber security...
The notorious Breached hacking forum has shut down after the remaining administrator, Baphomet, disclosed that they believe law enforcement has...
Security researchers have discovered attacks from an advanced threat actor that used “a previously unseen malicious framework” called CommonMagic and...
In a sudden turn of events, Baphomet, the current administrator of BreachForums, said in an update on March 21, 2023,...
Amid the ongoing war between Russia and Ukraine, government, agriculture, and transportation organizations located in Donetsk, Lugansk, and Crimea have...