T-Mobile agrees to pay customers $350 million in settlement over data breach
T-Mobile has agreed to pay $350 million to settle class action claims related to a 2021 cyberattack which impacted around...
T-Mobile has agreed to pay $350 million to settle class action claims related to a 2021 cyberattack which impacted around...
The Spanish police arrested two individuals accused to have hacked the country’s radioactivity alert network (RAR) in 2021. The Spanish...
A vulnerability affecting open source e-commerce platform PrestaShop could spell trouble for servers running PrestaShop websites. The 15-year-old organisation’s platform...
Threat actors are increasingly abusing Internet Information Services (IIS) extensions to maintain persistence on target servers. Microsoft warns of threat...
Researchers uncovered an ongoing operation, codenamed DUCKTAIL that targets Facebook Business and Ad Accounts. Researchers from WithSecure (formerly F-Secure Business)...
Researchers found similarities between LockBit 3.0 ransomware and BlackMatter, which is a rebranded variant of the DarkSide ransomware. Cybersecurity researchers have...
It wasn’t so long ago that we were wondering what improvements Windows 11 would make in the security stakes. Well,...
Streamlining and enhancing security in the cloud with AWS and Trend Micro If you like the site, please consider joining...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
The U.S. State Department increased rewards for information on any North Korea-linked threat actors to $10 million. In April 2020,...
Qakbot malware operators are using the Windows Calculator to side-load the malicious payload on target systems. Security expert ProxyLife and Cyble...
Researchers at Intezer have published a technical analysis of Lightning Framework, a previously undocumented and undetected Linux threat. Lightning is...
Bad news for players of long-time virtual pet management title Neopets. Word is spreading of a compromise claimed to have...
Thera actors are exploiting a zero-day vulnerability to steal payment information from sites using the open source e-commerce platform PrestaShop. Threat actors are...
Introduction Rootkits are malware implants which burrow themselves in the deepest corners of the operating system. Although on paper they...
Kaspersky uncovered a new UEFI firmware rootkit, tracked as CosmicStrand, which it attributes to an unknown Chinese-speaking threat actor. Researchers...
In June 2022, LockBit revealed version 3.0 of its ransomware. In this blog entry, we discuss the findings from our...
Multiple flaws in FileWave mobile device management (MDM) product exposed organizations to cyberattacks. Claroty researchers discovered two vulnerabilities in the...
The ransomware group Lockbit claims to have stolen 78 GB of files from the Italian Revenue Agency (Agenzia delle Entrate). The ransomware gang...
Operators behind the Amadey Bot malware use the SmokeLoader to distribute a new variant via software cracks and keygen sites....
Drupal development team released security updates to fix multiple issues, including a critical code execution flaw. Drupal developers have released...
North Korea-linked APT37 group targets high-value organizations in the Czech Republic, Poland, and other countries. Researchers from the Securonix Threat...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs for...
Threat actor leaked data of 5.4 million Twitter users that were obtained by exploiting a now patched flaw in the...