New Checkmate ransomware target QNAP NAS devices
Taiwanese vendor QNAP wars of a new strain of ransomware, dubbed Checkmate, that is targeting its NAS devices. The Taiwanese...
Taiwanese vendor QNAP wars of a new strain of ransomware, dubbed Checkmate, that is targeting its NAS devices. The Taiwanese...
We investigate cloud-based cryptocurrency miners that leverage GitHub Actions and Azure virtual machines, including the cloud infrastructure and vulnerabilities that...
Researchers uncovered a large-scale cryptocurrency mining campaign targeting the NPM JavaScript package repository. Checkmarx researchers spotted a new large-scale cryptocurrency...
US authorities have issued a joint advisory warning of North Korea-linked APTs using Maui ransomware in attacks against the Healthcare...
I’m proud to announce that the European Union Agency for Cybersecurity, ENISA, has released the Threat Landscape Methodology. Policy makers,...
The historical overturning of Roe v. Wade in June prompted lawmakers and technology companies to respond with deep concern over...
Cybersecurity researchers warn of new malware, tracked as OrBit, which is a fully undetected Linux threat. Cybersecurity researchers at Intezer...
The development team behind the OpenSSL project fixed a high-severity bug in the library that could potentially lead to remote code execution....
Among the various offensive security techniques, vulnerability assessment takes priority when it comes to analyzing the security of IoT/IIoT devices....
Hotel chain Marriott International suffered a new data breach, a threat actor has stolen 20GB from the company. Hotel chain...
We explore Trend Micro’s latest research into industrial cybersecurity, including the impact of attacks, maturity of security programs, and recommendations...
We recently found a new ransomware family, which we have dubbed as HavanaCrypt, that disguises itself as a legitimate Google...
In this three-part blog series, we’ll look into Data Distribution Service, why it is critical, and how you can mitigate...
Experts observed an increase in malicious activity targeting law enforcement agencies at the beginning of Q2 2022. Resecurity, a Los...
Threat actors are abusing legitimate adversary simulation software BRc4 in their campaigns to evade detection. Researchers from Palo Alto Networks...
NCSC urges organisations to prepare for the long haul on Russia-Ukraine UK organisations offered guidance on maintaining cyber security staff...
Brendan Carr, the commissioner of the FCC (Federal Communications Commission), called on the CEOs of Apple and Google to remove...
Hive ransomware operators have improved their file-encrypting module by migrating to Rust language and adopting a more sophisticated encryption method....
Two insiders and an accomplice were indicted on Tuesday for multiple counts of fraud. According to documents unsealed by the...
Researchers from ReversingLabs discovered tens of malicious NPM packages stealing data from apps and web forms. Researchers from ReversingLabs discovered...
Iran’s Fars News Agency reported that a massive cyberattack hit operating systems and servers of the Tel Aviv Metro. Iran’s...
The Cyber Police of Ukraine arrested nine members of a cybercriminal gang that has stolen 100 million hryvnias via phishing...
Threat actors compromised the Twitter and YouTube accounts of the British Army to promote online crypto scams. The Twitter and...
The vulnerability disclosure platform HackerOne has revealed that one of their staff members had improperly accessed security reports for personal...