Tainted CCleaner Pro Cracker spreads via Black Seo campaign
Threat actors spread info-stealing malware through the search results for a pirated copy of the CCleaner Pro Windows optimization program....
Threat actors spread info-stealing malware through the search results for a pirated copy of the CCleaner Pro Windows optimization program....
A router is a gateway from the internet to a home or office — despite being conceived quite the opposite....
0patch researchers released an unofficial security patch for a Windows zero-day vulnerability dubbed DogWalk. 0patch released an unofficial security patch...
Trend Micro Research observed the resurgence of the Cuba ransomware group that launched a new malware variant using different infection...
Malware authors and distributors are following the ebbs and flow of the threat landscape. One campaign we have tracked for...
“A robot may not injure a human being or, through inaction, allow a human being to come to harm” Science...
An international operation led by the US authorities dismantled and seized the infrastructure of the online marketplace SSNDOB. US DoJ announced...
There’s no shortage of reasons why an SMB might use Linux to run their business: There are plenty of distros...
The United States Department of Justice has announced a major takedown of a criminal marketplace that traded Personally Identifiable Information...
China-linked threat actors have breached telecommunications companies and network service providers to spy on the traffic and steal data. US...
A mobile app violated Canada’s privacy laws via some pretty significant overreach with its tracking of device owners. The violation...
Black Basta ransomware gang implemented a new feature to encrypt VMware ESXi virtual machines (VMs) running on Linux servers. The...
This blog is part of our live coverage from RSA Conference 2022: US President Joseph R. Biden Jr., The White...
Account hijacking has sadly become a regular, everyday occurrence. But when it comes to hijacking accounts before they are even...
Mandiant researchers associate multiple LockBit ransomware attacks with the notorious Evil Corp Cybercrime Group. Mandiant researchers have investigated multiple LOCKBIT ransomware attacks...
Apple’s App Review process may have received ill wishes from many benevolent developers, but Apple has now revealed how effective...
The QBot malware operation has partnered with Black Basta ransomware group to target organizations worldwide. Researchers from NCC Group spotted...
At the end of May, researchers from the nao_sec team reported a new zero-day vulnerability in Microsoft Support Diagnostic Tool...
Prometheus—a ransomware build based on Thanos that locked up victims’ computers in the summer of 2021—included a major “vulnerability” that...
LockBit ransomware gang claims to have hacked the cybersecurity firm Mandiant, which is investigating the alleged security breach. Today the...
In this report, we investigate the reasons that the DeadBolt ransomware family is more problematic for its victims than other...
Trend Micro research reveals struggle to control cyber risks against mounting digital attack surfaces. If you like the site, please...
Trend Micro research reveals struggle to control cyber risks against mounting digital attack surfaces. If you like the site, please...
Updating endpoints on a network can be a daunting task. Testing before rollout can take time. Delays to patches going...