Millions of Spoofed Emails Bypass Proofpoint Security in Phishing Campaign
Millions of perfectly spoofed emails have been sent daily as hackers took advantage of a flaw in Proofpoint’s email protection...
Millions of perfectly spoofed emails have been sent daily as hackers took advantage of a flaw in Proofpoint’s email protection...
Security researchers have uncovered a sophisticated phishing campaign targeting Microsoft OneDrive users. The campaign employs advanced social engineering tactics to...
Basic security failings allowed hackers to access the personal details of 40 million British voters held by the UK’s Electoral...
As more people work remotely, IT departments must manage devices distributed over different cities and countries relying on VPNs and...
Cybersecurity researchers have detailed widespread phishing campaigns targeting small and medium-sized businesses (SMBs) in Poland during May 2024 that led...
A new iteration of a sophisticated Android spyware called Mandrake has been discovered in five applications that were available for...
The nation-state threat actor known as SideWinder has been attributed to a new cyber espionage campaign targeting ports and maritime...
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts. Each...
A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by "several" ransomware groups to gain elevated...
Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim of executing a...
A US-headquartered cryptocurrency exchange has revealed a supply chain breach which led to the compromise of personal and banking information...
Security researchers have shed light on a new iteration of Mandrake, a sophisticated Android cyber-espionage malware tool. Initially analyzed by...
An unknown PowerShell backdoor has been discovered alongside a new variant of the Zloader/SilentNight malware, Walmart’s Cyber Intelligence Team has...
European businesses have been urged to carefully assess what privacy, security and acceptable usage controls they need to place on...
Security researchers have unveiled critical vulnerabilities within web analytics provider Hotjar and global news outlet Business Insider. The findings, from Salt...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI) product has been exploited...
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email...
A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service...
Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must...
The remote access trojan known as Gh0st RAT has been observed being delivered by an "evasive dropper" called Gh0stGambit as...
French judicial authorities, in collaboration with Europol, have launched a so-called "disinfection operation" to rid compromised hosts of a known...
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems with...
A hacktivist group has claimed to have leaked CrowdStrike’s entire internal threat actor list, including indicators of compromise (IoC).CrowdStrike acknowledged...