This Entertainment-Themed Campaign Installs Malware in User Computer System
A popular phishing campaign tries to somehow get users to believe that they've enrolled in the film streaming platform to...
A popular phishing campaign tries to somehow get users to believe that they've enrolled in the film streaming platform to...
SonicWall urges customers to address a post-authentication flaw that affects on-premises versions of the Network Security Manager (NSM). SonicWall urges...
Industrial cybersecurity firm Claroty discovered a new flaw in Siemens PLCs that can be exploited by a remote and unauthenticated...
FireEye Mandiant, working in in tandem with the Cybersecurity and Infrastructure Security Agency and Ivanti, reported details of 16 malware...
On the 14th of May, the Health Service Executive (HSE), Ireland’s publicly funded healthcare system, fell victim to a Conti...
Nobelium is a synthetic chemical element with the symbol No and atomic number 102. It is named in honor of...
Cybercriminals have breached the offices of multiple Japanese agencies by hacking into Fujitsu’s software-as-a-service (SaaS) platform and gaining access to...
Siemens published a consumer notice on Tuesday 25th of May concerning several serious vulnerabilities impacting its Solid Edge product. The...
Dubai appears to have developed its own cryptocurrency, known as the DubaiCoin (DBIX). It is established on a public blockchain,...
Researchers from FireEye warn that China-linked APT groups continue to target Pulse Secure VPN devices to compromise networks. Cybersecurity researchers...
Microsoft experts uncovered a wide-scale malicious email campaign operated by NOBELIUM, the threat actor behind SolarWinds hack. Microsoft Threat Intelligence...
Canada Post disclosed a ransomware attack on a third-party service provider that exposed shipping information for their customers. Canada Post...
The FBI revealed that foreign hackers compromised the network of a local US municipal government by exploiting flaws in an...
The US Department of Homeland Security (DHS) has announced new cybersecurity requirements for critical pipeline owners and operators. The Colonial pipeline...
An aerial view of a wastewater treatment plant in California. An attempt to poison the Oldsmar, Florida water supply by...
As cybersecurity products evolve to better protect against new forms of malware, trickier evasion techniques, and more organized cybercrime campaigns,...
The Portable Document Format (PDF) file type is one of the most common file formats in use today. It’s value...
Healthcare and ransomware are in the news in a big way. Data leaks are inevitable, but those are typically associated...
The state-owned postal service, Canada Post has reported that a cyber-attack on a third-party provider resulted in a data breach...
The press service of the Moscow Department of Information Technologies informs that the specialists of the Scientific-Research Institute of Metallurgical...
Social media companies such as Facebook, Twitter, YouTube, Instagram, and WhatsApp will lose their status as ‘intermediaries” that granted them...
A security researcher identified the first-ever vulnerability in Apple M1 chips that requires a silicon redesign to fix. The good...
Tens of thousands of Google Chrome extensions accessible from the official Chrome Online Store manipulate security headers on major websites,...
NASA identified more than 6,000 cyber-related incidents in the last four years, according to a report published by its Office...