Hackers Publish Classified Documents Stolen from Lithuanian Ministry of Foreign Affairs
The Lithuanian Ministry of Foreign Affairs has refused to comment regarding the credibility of e-mail files allegedly stolen from its...
The Lithuanian Ministry of Foreign Affairs has refused to comment regarding the credibility of e-mail files allegedly stolen from its...
According to cybersecurity firm Aqua Security, a recently discovered crypto mining technique used malicious Docker images to takeover companies' computing...
For months, the Slovak government has been targeted by a cyber-espionage group associated with a Russian intelligence agency, Slovak security...
Mimikatz has been used by a vulnerability researcher to dump a user's unencrypted plaintext Microsoft Azure credentials from Microsoft's new...
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free...
The Glowworm attack leverages optical emanations from a device’s power indicator LED to recover sounds from connected peripherals and spy...
The popular black marketplace AlphaBay is back, four years after law enforcement agencies took down the popular hidden service. The darknet marketplace...
Emails allegedly stolen from the Lithuanian Ministry of Foreign Affairs are available for sale in a cybercrime forum, some emails...
Heimdal Security researchers have unearthed a new ransomware strain along with a ransomware note, signed by a group calling itself...
There has been an ongoing war between criminals and authorities in cyberspace for years. Although cryptocurrencies are anonymous in nature,...
Check Point Research reveals that for straight three months the Trickbot is by far the most common malware, whereas, for...
A security expert devised a method to retrieve a user’s Microsoft Azure credentials in plaintext from Microsoft’s new Windows 365...
The SynAck ransomware gang released the master decryption keys for their operations and rebranded as a new group dubbed El_Cometa...
Another ransomware gang, the Vice Society ransomware operators, is using Windows print spooler PrintNightmare exploits in its attacks. The Vice...
In an extensive report about a phishing campaign, the Microsoft 365 Defender Threat Intelligence Team describes a number of encoding...
A fair few cryptocurrency scams have been doing the rounds across 2021. Most of them are similar if not identical...
The primary function of a Virtual Private Network (VPN) is to enhance your online privacy and security. It should do...
At some point in our lives, we have likely either been bullied, stood back and watched others bullying, or participated...
Microsoft has revealed details of a deceptive year-long social engineering campaign in which the operators changed their obfuscation and encryption...
Researchers from Samara State University have developed a technology to assess the psychological qualities of a job seeker using a...
Cybersecurity firm Intsights published a new report that highlights the vibrant marketplaces on the dark web where attackers can buy...
The hacking group behind a ransomware attack on global solution provider powerhouse Accenture has demanded $50 million in ransom, as...
A ransomware attack on one of the leading healthcare organizations in southeast Georgia compromised personnel and patients' protected health information...
Google has open-sourced the Allstar tool that can be used to secure GitHub projects and prevent security misconfigurations. Google has open-sourced the Allstar tool...