The fire in the OVH datacenter also impacted APTs and cybercrime groups
The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT...
The fire at the OVH datacenter in Strasbourg also impacted the command and control infrastructure used by several nation-state APT...
Kaspersky researchers spotted a new variant of the XCSSET Mac malware that compiled for devices running on Apple M1 chips....
An actor claimed to have registered one of the domains of WeLeakInfo, accessed details of 10000+ WeLeakInfo’ s customers, and...
The Microsoft Exchange attacks using the ProxyLogon vulnerability, and previously associated with the dropping of malicious web shells, are taking...
Hackers were able to gain access to camera feeds from Verkada, a tech company that specializes in video security and...
The number of Americans influenced by a cyber assault on a cloud facilitating and IT services provider has expanded by...
A security vulnerability in a famous iPhone call recording application exposed thousands of users' recorded conversations. The flaw was found...
The Spanish State Employment Service (SEPE) has been targeted by a ransomware attack which has resulted in hundreds of offices...
Yet again for the second time in about six months, Norway's parliament has been hacked. Government officials acknowledged the infiltration...
Introduction A short while ago, Apple released Mac computers with the new chip called Apple M1. The unexpected release was...
Experts at the NetBlocks Internet Observatory observed this week a temporary disruption of internet service in Russia due to new...
Researchers warn of a surge in cyber attacks against Microsoft Exchange servers exploiting the recently disclosed ProxyLogon vulnerabilities. Researchers at...
Researchers at Trustwave spotted a new malspam campaign that is abusing icon files to trick victims into installing the NanoCore...
This week a security researcher published on GitHub a proof-of-concept tool to hack Microsoft Exchange servers chaining two of ProxyLogon...
At the moment, I’m really torn, and I need your help. Let me tell you what is going on. I...
Virtual Private Networks (VPNs) are popular but often misunderstood. There are many misconceptions about them—misconceptions that may be stopping people...
The Federal Service for Supervision of Communications, Information Technology and Mass Media (Roskomnadzor) accused Twitter of numerous violations and failure...
The Telecom Regulatory Authority of India (TRAI) has temporarily suspended its new rules for curbing spam messages, following major disruptions...
One specific aspect of malware and one vulnerability continues to develop as security companies have been reconstructing the highest trends...
GitHub on Monday informed clients that it had found what it described as an “extremely rare, but potentially serious” security...
2020 was a tumultuous year for vulnerability risk management. Defenders had to contend with a growing volume of high-priority security...
Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway...
Intezer experts have spotted a new strain of Linux backdoor dubbed RedXOR that is believed to be part of the...
Security firm F5 announced the availability of patches for seven vulnerabilities in BIG-IP, four of which have been rated as...