The world’s most coveted spyware, Pegasus: Lock and Code S03E04
Two years ago, the FBI reportedly purchased a copy of the world’s most coveted spyware, a tool that can remotely...
Two years ago, the FBI reportedly purchased a copy of the world’s most coveted spyware, a tool that can remotely...
Twitter is transitioning away from from its two-factor authentication (2FA) provider, Mitto AG, a Swiss communications company. The social media...
Organizations have paid more than $600 million in cryptocurrency during 2021, nearly one-third to the Conti ransomware gang. Last week,...
A ransomware attack hit the corporate IT network of the San Francisco 49ers NFL team, The Record reported. The San...
Cybersecurity researchers Zoziel Pinto Freire analyzed the use of weaponized PDFs in phishing attacks Every day everybody receives many phishing...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
Organizations are addressing zero-day vulnerabilities more quickly, compared to last year, Google’s Project Zero reported. According to Google’s Project Zero...
CISA, FBI and NSA published a joint advisory warning of ransomware attacks targeting critical infrastructure organizations. Cybersecurity agencies from the...
Croatian phone carrier A1 Hrvatska has disclosed a data breach that has impacted roughly 200,000 customers. Croatian phone carrier A1...
FritzFrog P2P botnet is back and is targeting servers belonging to entities in the healthcare, education, and government sectors. FritzFrog...
Explore 3 cyber security trends and how to strategically mitigate future risks with Trend Micro’s Jon Clay, VP of threat...
Hidden scams in malicious scans, and feds arrest couple who allegedly laundered $1 Billion in stolen bitcoins If you like...
This blog discusses how CVE-2021-4034 can be detected and blocked using Trend Micro™ Vision One™ and Trend Micro Cloud One™....
The U.S. CISA has added to the catalog of vulnerabilities another 15 security vulnerabilities actively exploited in the wild. The...
Apple addressed a new WebKit zero-day affecting iOS, iPadOS, macOS, and Safari that may have been actively exploited in the wild. Apple...
When Ioannis Dekas, a father of four boys, found that one of his sons had access to pornography, he and...
Apple has released a security fix for a zero-day vulnerability (CVE-2022-22620) that it says “may have been actively exploited.” According...
News roundup Q4 2021 saw the appearance of several new DDoS botnets. A zombie network, named Abcbot by researchers, first...
Spanish National Police arrested eight alleged members of a crime ring specialized in SIM swapping attacks. Spanish National Police has...
If you’re unfortunate enough to be caught out by ransomware, the consequences can be devastating. You may be able to...
Experts uncovered a mass Magecart campaign that compromised over 500 e-store running the Magento 1 eCommerce platform. Researchers from cybersecurity...
Malwarebytes’ researchers are closely monitoring web skimmers and have noticed that one of the infamous Magecart groups is causing a...
The Uptycs threat research team has been observing an increase in utilization of regsvr32.exe heavily via various types of Microsoft...
IPv6 became imperative after developers discovered that IPv4 had a finite number and addresses. How does an IPv6 Proxy work?...