Stealthier version of Linux BPFDoor malware spotted in the wild
A new, stealthier variant of the Linux malware 'BPFDoor' has been discovered, featuring more robust encryption and reverse shell communications....
A new, stealthier variant of the Linux malware 'BPFDoor' has been discovered, featuring more robust encryption and reverse shell communications....
One of WordPress's most popular Elementor plugins, "Essential Addons for Elementor," was found to be vulnerable to an unauthenticated privilege...
U.S. tech company and Siemens subsidiary Brightly Software is notifying customers that their personal information and credentials were stolen by...
An increasing number of ransomware operations are adopting the leaked Babuk ransomware source code to create Linux encryptors targeting VMware...
Swiss multinational company ABB, a leading electrification and automation technology provider, has suffered a Black Basta ransomware attack, reportedly impacting...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A previously undetected advanced persistent threat (APT) actor dubbed Red Stinger has been linked to attacks targeting Eastern Europe since...
The National Police of Spain said it arrested 40 individuals for their alleged involvement in an organized crime gang called...
Multiple threat actors have capitalized on the leak of Babuk (aka Babak or Babyk) ransomware code in September 2021 to...
According to Forrester, External Attack Surface Management (EASM) emerged as a market category in 2021 and gained popularity in 2022....
Twitter is officially beginning to roll out support for encrypted direct messages (DMs) on the platform, more than six months...
A nascent botnet called Andoryu has been found to exploit a now-patched critical security flaw in the Ruckus Wireless Admin...
GitHub has announced the general availability of a new security feature called push protection, which aims to prevent developers from...
Why more transparency around cyber attacks is a good thing for everyone At the NCSC and ICO, we deal with...
One of the biggest security threats is password cracking. Are you an IT system administrator concerned about the security of...
The Phishing-as-a-Service (PhaaS) platform named 'Greatness' has seen a spike in activity as it targets organizations using Microsoft 365 in...
Joseph James O'Connor, aka 'PlugwalkJoke,' has pleaded guilty to multiple cybercrime offenses, including SIM swapping attacks, cyberstalking, computer hacking, and...
A recently spotted malvertising campaign tricked users with an in-browser Windows update simulation to deliver the Aurora information stealing malware....
Industrial cybersecurity company Dragos today disclosed what it describes as a "cybersecurity event" after a known cybercrime gang attempted to...
The Korean National Police Agency (KNPA) warned that North Korean hackers had breached the network of one of the country's...
A new 'White Phoenix' ransomware decryptor allows victims to partially recover files encrypted by ransomware strains that use intermittent encryption....
New samples of the RapperBot botnet malware have added cryptojacking capabilites to mine for cryptocurrency on compromised Intel x64 machines....
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Google unveiled a slew of new privacy, safety, and security features today at its annual developer conference, Google I/O. The...