Threat actors are probing Microsoft Exchange servers for ProxyShell flaws
Threat actors are actively scanning for the Microsoft Exchange ProxyShell RCE flaws after technical details were released at the Black Hat...
Threat actors are actively scanning for the Microsoft Exchange ProxyShell RCE flaws after technical details were released at the Black Hat...
Group-IB detected an unconventional post on several carding forums containing links to a file containing 1 million compromised cards. On...
Gigabyte, a motherboard developing company from Taiwan and also a hardware giant was attacked by the RansomExx ransomware hacking group,...
Cybersecurity intelligence at the security firm Intezer has discovered a new Golang-based worm that is attacking Windows and Linux servers...
The Illinois State Police are notifying Firearm Owners Identification cardholders regarding a possible data breach after attackers attempted to breach...
According to the Lithuanian military, the sharp increase in the number of hacks is caused by two main reasons –...
In a Thursday security advisory update, Cisco disclosed that a remote code execution (RCE) vulnerability discovered last month in the...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
A remote code execution (RCE) vulnerability in the Cisco Adaptive Security Device Manager (ADSM) Launcher disclosed in July has yet...
Threat actors are actively exploiting a critical authentication bypass issue (CVE-2021-20090) affecting home routers with Arcadyan firmware. Threat actors actively...
Cybersecurity experts have found a technique for Telegram users of Mac to keep self disappearing texts or view the messages...
One of the latest researches revealed that cybercriminals who employ malware often use the Cobalt Strike tool to release multiple...
External attack surface management platform, Reposify, has discovered multiple vulnerabilities in the IT networks of Las Vegas’s leading casinos. Recently,...
Researchers discovered a new category of DNS vulnerabilities hitting major DNS-as-a-Service (DNSaaS) providers, which may enable attackers to get access...
A frustrated Conti affiliate revealed the gang's training material during attacks and released details on one of the administrators of...
Taiwanese manufacturer and distributor of computer hardware GIGABYTE was a victim of the RansomEXX ransomware gang. RansomEXX ransomware gang hit...
RansomEXX ransomware operators hit the popular Italian luxury fashion house Ermenegildo Zegna Holding and started leaking stolen files. Zegna is one of...
Security firm Ivanti addressed a critical vulnerability in its Pulse Connect Secure VPN appliances that could be exploited to execute...
The Internet has been on fire since the August 4 discovery (disclosed publicly by Mathew Green) that Apple will be...
In an attempt to make Edge more secure, the Microsoft Vulnerability Research team has started to experiment with disabling Just-In-Time...
CaaS (Crime as a Service) is a practice where veteran hackers sell tools and knowledge required to perform a cybercrime....
New security flaws have emerged in the AWS’ Amazon Simple Storage Service (S3) buckets which are now exposed via additional...
Amazon has been fined 746 million ($880 million) Euros by the Luxembourg government over data protection rules. Despite its powerful...
A recently patched vulnerability in the Chromium project enabled malicious parties to inject code in embedded site pages, despite the...