Emsisoft releases free SynAck ransomware decryptor
Emsisoft researchers have released a decryptor for the SynAck Ransomware that could allow victims of the gang to decrypt their...
Emsisoft researchers have released a decryptor for the SynAck Ransomware that could allow victims of the gang to decrypt their...
Web infrastructure and website security company Cloudflare announced to have mitigated the largest ever volumetric DDoS attack to date. Cloudflare,...
On the Cloudflare blog, the American web infrastructure behemoth that provides content delivery network (CDN) and DDoS mitigation services reports...
Cyber security researcher Bob Diachenko has unearthed an unsecured ElasticSearch server containing nearly two million terrorist watchlist records, including "no-fly" list...
The Poly Network attack took place two weeks ago, but the narrative is far from finished. Mr. White Hat, an...
A clandestine hacking organization successfully attacked both the government of Belarus and their Police, which provided these criminals with access...
Google has deleted eight bogus mobile apps from the Play Store that pretend to be bitcoin cloud-mining apps but are...
The Internet Systems Consortium (ISC) addressed a high-severity denial-of-service (DoS) flaw (CVE-2021-25218) affecting the BIND DNS software. The Internet Systems...
Mozi botnet continues to evolve, its authors implemented new capabilities to target Netgear, Huawei, and ZTE network gateways. Microsoft researchers...
Unauthenticated attackers could bypass TLS inspection filtering solution in multiple products to exfiltrate data from previously compromised servers, Cisco warns....
During the first half of 2021, 637 vulnerabilities affecting industrial control system (ICS) products were published, affecting products from 76...
Japanese cryptocurrency exchange Liquid was hit by a cyber attack, threat actors stole $97 Million worth of crypto-currency assets from...
Cisco has no plan to fix a critical code execution flaw (CVE-2021-34730) in small business RV110W, RV130, RV130W, and RV215W...
In a security advisory, Cisco has informed users that a vulnerability in the Universal Plug-and-Play (UPnP) service of Cisco Small...
At the end of last week, T-Mobile was investigating reports of a “massive” customer data breach. A hacker claimed to stolen 100...
You’ve likely seen fake parcel delivery texts in the news recently, and we’ve covered a few of these ourselves. SMS...
Since the beginning of the year, Kaspersky Lab has detected more than 1,500 fraudulent resources around the world aimed at...
Researchers at Tencent have issued a warning regarding a HolesWarm cryptominer malware campaign that has exploited more than 20 known...
According to the FBI, hackers are hacking online accounts at grocery shops, restaurants, and food delivery services using credential stuffing...
Representatives of Roskomnadzor accused the American corporation Google of blackmail after its statement about possible risks for Russia associated with...
To mask their actual objectives, hackers affiliated with the government of Iran have concentrated their offensive efforts on IT and...
Threat actors breached the servers of US Census Bureau on January 11, 2020, exploiting an unpatched Citrix ADC zero-day vulnerability,...
North Korea-linked InkySquid group leverages two Internet Explorer exploits to deliver a custom implant in attacks aimed at a South...
Researchers conducted a new analysis of the Diavol ransomware and found new evidence of the link with the gang behind...