Attack infrastructure used in Cisco hack linked to Evil Corp affiliate
Researchers discovered that the infrastructure used in Cisco hack was the same used to target a Workforce Management Solution firm....
Researchers discovered that the infrastructure used in Cisco hack was the same used to target a Workforce Management Solution firm....
Researchers from Cyble analyzed a new, highly evasive JavaScript skimmer used by Magecart threat actors. Cyble Research & Intelligence Labs...
The metaverse is coming—but what does that mean for network infrastructure? We explore expected changes, network challenges, and tips for...
The Ragnar Locker ransomware gang claims to have hacked the Portuguese state-owned flag carrier airline TAP Air Portugal and stolen...
Researchers discovered 1,859 Android and iOS apps containing hard-coded Amazon Web Services (AWS) credentials. Researchers from Broadcom Symantec’s Threat Hunter...
A team of cybersecurity experts from the US FBI will help the authorities in Montenegro to investigate the recent massive...
Apple released new security updates for older iPhone and iPad devices addressing recently fixed WebKit zero-day. Apple has released new updates...
Microsoft discovered a vulnerability in the TikTok app for Android that could lead to one-click account hijacking. Microsoft researchers discovered...
This blog entry highlights the threats that dominated the first six months of the year, which we discussed in detail...
Italian oil giant Eni was hit by a cyber attack, attackers compromised its computer networks, but the consequences appear to...
A malware campaign tracked as GO#WEBBFUSCATOR used an image taken from NASA’s James Webb Space Telescope (JWST) as a lure....
Researchers spotted 5 malicious Google Chrome extensions used to track users’ browsing activity and profit of retail affiliate programs. McAfee...
Experts uncovered a cyber espionage campaign conducted by a China-linked APT group and aimed at several entities in the South...
The Russian subscription-based streaming service Start discloses a data breach affecting 7.5 million users. The Russian media streaming platform START...
MSP partnerships are growing in line with rapid cloud migration and the evolving threat landscape. Discover how an MSP can...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Google this week launched a new bug bounty program that covers the open source projects of the IT giant. Google...
Researchers spotted three campaigns delivering multiple malware, including ModernLoader, RedLine Stealer, and cryptocurrency miners Cisco Talos researchers observed three separate,...
A group of researchers from the Georgia Institute of Technology discovered malicious plugins on tens of thousands of WordPress sites....
Baker & Taylor, one of the world’s largest distributors of books, revealed that it was hit by a ransomware attack....
The U.S. FBI warns investors that crooks are increasingly exploiting security issues in Decentralized Finance (DeFi) platforms to steal cryptocurrency....
The U.S. FTC sued US data broker Kochava for selling sensitive and precise geolocation data collected from hundreds of millions...
Threat actors behind the Twilio hack also gained access to the accounts of 93 individual users of its Authy two-factor...
Researchers spotted a Turkish-based crypto miner malware campaign, tracked as Nitrokod, which infected systems across 11 countries. Check Point researchers...