Phishing-kit market: what’s inside “off-the-shelf” phishing packages
What are phishing kits? One of the most common tricks scammers use in phishing attacks is to create a fake...
What are phishing kits? One of the most common tricks scammers use in phishing attacks is to create a fake...
Russia is in the midst of its fourth week of attack against Ukraine. People worldwide have been increasingly and passionately...
A researcher discovered critical flaws that can be exploited by remote attackers to hack a building controller popular in Russia....
We provide an overview of the diverse range of NFT- and cryptocurrency-related scams that malicious actors use to steal assets...
The ever-expanding attack surface of the cloud calls for effective cyber risk management to enable enterprises to innovate and meet...
Anonymous launches its offensive against Wester companies still operating in Russia, it ‘DDoSed’ Auchan, Leroy Merlin e Decathlon websites. Since...
VMware addressed two critical arbitrary code execution vulnerabilities affecting its Carbon Black App Control platform. VMware released this week, software...
Back in January, we wrote about how the Dark Souls games had their online components switched off for PC gamers....
In two security advisories, HP has alerted users to the existence of security vulnerabilities in several of its printer models....
The Anonymous hacker collective claims to have hacked the Central Bank of Russia and stole accessed 35,000 documents. Anonymous continues...
The provider of access management systems Okta confirmed the data breach and revealed that 2.5% of its customers were impacted....
Ukraine CERT-UA warns of cyberattack aimed at Ukrainian enterprises using the a wiper dubbed DoubleZero. Ukraine CERT-UA continues to observe...
On Monday, the White House told US business leaders to toughen up their cybersecurity defenses against a potential cyberattack from...
Through its usual means of communication, its Telegram channel, the LAPSUS$ group has posted screenshots of what appears to be...
The FBI is warning of risks related to cyber attacks aimed at energy companies of Russia-linked threat actors. The FBI...
Gimmick is a newly discovered macOS implant developed by the China-linked APT Storm Cloud and used to target organizations across...
Microsoft confirmed that Lapsus$ extortion group has hacked one of its employees to access and steal the source code of...
The popular Anonymous hacktivist collective announced to have hacked Nestlè and leaked 10 GB of sensitive data because the food...
Vulnerabilities in software and infrastructure are a fact of life for developers and SREs. But when you understand vulnerabilities, you...
It’s not unusual to hear about malware created to affect automated teller machines (ATMs). Malware can be planted at the...
Internet search engine Censys reported a new wave of DeadBolt ransomware attacks targeting QNAP NAS devices. Internet search engine Censys...
It’s not unusual for sites and services to offer additional forms of protection on top of regular security features. Some...
Three critical RCE flaws affect hundreds of HP LaserJet Pro, Pagewide Pro, OfficeJet, Enterprise, Large Format, and DeskJet printer models....
The Lapsus$ extortion group claims to have stolen sensitive data from the identity and access management giant Okta solutions. The gang...