AcidRain, a wiper that crippled routers and modems in Europe
Researchers spotted a new destructive wiper, tracked as AcidRain, that is likely linked to the recent attack against Viasat. Security...
Researchers spotted a new destructive wiper, tracked as AcidRain, that is likely linked to the recent attack against Viasat. Security...
Zyxel issued security updates for a critical vulnerability that affects some of its business firewall and VPN devices. Networking equipment...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Sophos firewall flaw and seven other issues to...
Wyze Cam devices are affected by three security vulnerabilities that can allow attackers to takeover them and access camera feeds....
For the Lazarus threat actor, financial gain is one of the prime motivations, with a particular emphasis on the cryptocurrency...
Cybersecurity can be complex work, as security teams need to regularly decipher and prioritize alerts, protect against daily threats, and...
Apple released emergency patches to address two zero-day vulnerabilities actively exploited to compromise iPhones, iPads, and Macs. Apple has released...
Calendars are a rich source of bad behaviour for scammers and spammers. They’re one of the most prolific tools the...
The Malwarebytes Threat Intelligence team has identified a malvertising campaign targeting Japanese users. The campaign they discovered was found to...
There’s a flaw in the way many of the world’s most popular messaging and email platforms—such as Facebook Messenger, Instagram,...
The Google TAG uses uncovered phishing attacks targeting Eastern European and NATO countries, including Ukraine. The Google Threat Analysis Group (TAG) provided...
The Anonymous collective hacked the Russian investment firm Thozis Corp, but it’s a mystery the attack against the Russian Civil...
Given current world events, there’s an incredible amount of misinformation and disinformation around at the moment. Whether we’re talking 5G,...
An unauthenticated zero-day RCE vulnerability in the Spring Core Java framework called ‘Spring4Shell’ has been publicly disclosed. Researchers disclosed a...
The Morphisec Labs researchers analyzed a new malware, tracked as Mars stealer, which is based on the older Oski Stealer. Morphisec...
In this blog series our team examined various ICS vulnerabilities using the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK)...
SonicWall released security updates to address a remote code execution vulnerability that affects multiple firewall appliances. SonicWall has released security...
The US CISA and the Department of Energy issued guidance on mitigating attacks against uninterruptible power supply (UPS) devices. The...
The Lapsus$ extortion group claims to have hacked IT giant Globant and leaked tens of gigabytes of stolen data. The...
Google has launched Chrome version 100 which, among other things, fixes 28 vulnerabilities. Other new security features include Safety Check,...
If you’ve received a spam SMS message sent from your own phone number, don’t panic. No, you weren’t hacked. And...
Despite continued warnings of deepfake chaos during major events, things haven’t worked out the way some thought. Those video deepfakes...
Cybersecurity firm Sophos warned that the recently addressed CVE-2022-1040 flaw in Sophos Firewall is actively exploited in attacks. Sophos has recently fixed...
Threat actors have stolen approximately $625 million worth of Ethereum and USDC tokens from Axie Infinity ‘s Ronin network bridge....