$30 Million worth of cryptocurrency stolen by Lazarus from Axie Infinity was recovered
US authorities recovered more than $30 million worth of cryptocurrency stolen by the North Korea-linked Lazarus APT from Axie Infinity....
US authorities recovered more than $30 million worth of cryptocurrency stolen by the North Korea-linked Lazarus APT from Axie Infinity....
Threat actors are exploiting a zero-day vulnerability in a WordPress plugin called BackupBuddy, Wordfence researchers warned. On September 6, 2022, the...
Iran-linked APT group DEV-0270 (aka Nemesis Kitten) is abusing the BitLocker Windows feature to encrypt victims’ devices. Microsoft Security Threat...
H1 2022 in numbers Geography In H1 2022, malicious objects were blocked at least once on 31.8% of ICS computers...
CISA added 12 more security flaws to its Known Exploited Vulnerabilities Catalog including four D-Link vulnerabilities. The U.S. Cybersecurity and Infrastructure...
This article will explore three solutions, CIEM, CWPP, and CSPM, detail a sample case for each, and help you to...
Ed Cabrera, former CISO of the US Secret Service and current Chief Cybersecurity Officer for Trend Micro, reflects on the...
Through our honeypots and telemetry, we were able to observe instances in which malicious actors abused native Linux tools to...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Threat actors claimed to have stolen classified NATO documents from the Armed Forces General Staff agency of Portugal (EMGFA). After...
N National Cyber Security Centre CEO Lindy Cameron discussed cyber security from a UK perspective during two appearances at a...
North Korea-linked Lazarus APT group is targeting energy providers around the world, including organizations in the US, Canada, and Japan. Talos researchers...
Cisco fixed new security flaws affecting its products, including a recently disclosed high-severity issue in NVIDIA Data Plane Development Kit. The most...
Some members of the Conti ransomware gang were involved in financially motivated attacks targeting Ukraine from April to August 2022....
Albania interrupted diplomatic ties with Iran and expelled the country’s embassy staff over the mid-July attack. Albanian Prime Minister Edi...
We analyzed the Distroless technique for reducing the size of container images and explored its capabilities to address security concerns....
A new Linux malware dubbed Shikitega leverages a multi-stage infection chain to target endpoints and IoT devices. Researchers from AT&T Alien Labs...
In the digital age, authentication is paramount to a strong security strategy. Which are the challenges of user authentication? In...
Networking equipment vendor Zyxel addressed a critical vulnerability impacting its network-attached storage (NAS) devices. Zyxel addressed a critical vulnerability, tracked...
The Moobot botnet is behind a new wave of attacks that started in early August and that target vulnerable D-Link...
The gaming industry went into full gear during the pandemic, as many people took up online gaming as their new...
Explore hybrid cloud security challenges, components, and tips to minimize your cyber risk. If you like the site, please consider...
Play is a new ransomware that takes a page out of Hive and Nokoyawa's playbook. The many similarities among them...
Play is a new ransomware that takes a page out of Hive and Nokoyawa's playbook. The many similarities among them...