Ransomware in the CIS
Introduction These days, when speaking of cyberthreats, most people have in mind ransomware, specifically cryptomalware. In 2020–2021, with the outbreak...
Introduction These days, when speaking of cyberthreats, most people have in mind ransomware, specifically cryptomalware. In 2020–2021, with the outbreak...
Researchers detailed the activities of the FIN12 ransomware group that earned million of dollars over the past years. Researchers from...
The official Facebook page of the US Navy’s destroyer-class warship, USS Kidd, has been hijacked. According to Task & Purpose,...
A proof of concept exploit for two authentication bypass vulnerabilities in Dahua cameras is available online, users are recommended to...
The last few years have seen a mushrooming of the number and type of security tools that organizations can use...
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...
Google’s announced some changes to how it’s helping millions of its users stay safe and secure. The biggest of those...
Operation GhostShell: Threat actors used ShellClient malware in cyberespionage campaigns aimed at companies in the aerospace and telecommunications sectors. Hackers...
Resecurity researchers dumped Gigabytes of data from Agent Tesla C2Cs, one of the most well-known cyberespionage tools suffers a data...
An anonymous individual has leaked the source code and data of the popular video streaming platform Twitch via a torrent...
Online safety is hard enough for most adults. We reuse weak passwords, we click on suspicious links, and we love...
The Apache HTTP Server 2.4.49 is vulnerable to a flaw that allows attackers to use a path traversal attack to...
The governor of Arizona, Doug Ducey, has announced the launch of a Cyber Command Center to address the thousands of...
Big, breaking news going around at the moment. If you have a Twitch account, you may wish to perform some...
The UK media outlet The Telegraph has leaked 10 TB of subscriber data after failing to properly secure one of...
Boffins devised a new technique, dubbed LANtenna, to exfiltrate data from systems in air-gapped networks using Ethernet cables as a...
Apache has addressed two vulnerabilities, one of which is a path traversal and file disclosure flaw in its HTTP server...
An unnamed ransomware gang used a custom Python script to target VMware ESXi and encrypt all the virtual machines hosted...
Mark Zuckerberg was left counting the personal cost of bad PR yesterday (about $6 billion, according to Bloomberg) on a...
“A global privacy disaster”, “espionage gold”, and “a state-sponsored wet dream” are just some of the comments one can read...
Syniverse service provider discloses a security breach, threat actors have had access to its databases since 2016 and gained some...
Windows 11, the latest operating system (OS) from Microsoft, launches today, and organizations have begun asking themselves when and if...
The dark web marketplace White House Market shuts down its operation, last week its operators announced that they were retiring....
Experts discovered many misconfigured Apache Airflow servers exposed online that were leaking sensitive information from prominent tech firms. Apache Airflow is an...