Conti Ransomware Gang claims responsibility for the Nordex hack
The Conti ransomware gang has claimed responsibility for the recent attack against Nordex, one of the largest manufacturers of wind...
The Conti ransomware gang has claimed responsibility for the recent attack against Nordex, one of the largest manufacturers of wind...
A new powerful crimeware called ZingoStealer was released for free by a threat actor known as Haskers Gang. ZingoStealer is a...
Cisco fixed a critical flaw in Cisco Wireless LAN Controller (WLC) that could allow an unauthenticated, remote attacker to take...
Google Chrome 100.0.4896.127 addresses a new high-severity zero-day vulnerability tracked as CVE-2022-1364, actively exploited by threat actors in the wild....
Cybersecurity experts would have you believe that your organization’s employees have a crucial role in bolstering or damaging your company’s...
The analysis of a recent sample SunnyDay ransomware revealed some similarities with other ransomware, such as Ever101, Medusa Locker, Curator,...
The US government agencies warned of threat actors that are targeting ICS and SCADA systems from various vendors. The Department...
The U.S. CISA added the CVE-2022-24521 Microsoft Windows CLFS Driver Privilege Escalation Vulnerability to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity...
The deadline for filing your taxes in the US is nearly upon us. April 18 is the very last date...
After having tracked stalkerware for years, Malwarebytes can reveal that in 2021, detections for apps that can non-consensually monitor another...
Microsoft has announced that its Digital Crimes Unit (DCU) has taken legal and technical action to disrupt a malicious botnet...
Threat actors are actively exploiting a critical vulnerability in VMware Workspace ONE Access and Identity Manager recently patched by the...
Spam which claims your account has been locked out and needs to be fixed are common. They drive people to...
Emotet was first found in the wild in 2014. Back then its main functionality was stealing user banking credentials. Since...
Microsoft’s Digital Crimes Unit (DCU) announced to have shut down dozens C2 servers used by the infamous ZLoader botnet. Microsoft dismantled...
With most security incidents caused by exposed secrets in DevOps pipelines and tools, proper authentication and authorization is essential. Explore...
Apache addressed a critical flaw in Apache Struts RCE that was linked to a previous issue that was not properly...
We’re seeing lots of examples of peculiar SMS messages sent to random groups of people. Most of these messages promise...
China-linked Hafnium APT group started using a new piece of new malware to gain persistence on compromised Windows systems. The...
It’s that time of the month again. Time to check what needs to be updated and prioritize where necessary. The...
Researchers discovered five vulnerabilities that can be exploited to remotely hack hospital Aethon’s TUG autonomous mobile robots. Researchers at healthcare...
On April 9, hacking group BlueHornet tweeted about an experimental exploit for NGINX 1.18 and promised to warn companies affected...
Yesterday I received an SMS from “TestNTrace”, with the message resembling an official NHS communication: The text reads as follows:...
According to a report published by Reuters, an Israeli surveillance software was used to spy on senior officials in the...