Ransomware Attack by REvil on Apple, Demands $50 Million
While Apple was working on the preparations for the 'Spring Loaded' event that went live on Tuesday, 20th April, the...
While Apple was working on the preparations for the 'Spring Loaded' event that went live on Tuesday, 20th April, the...
A new Linux botnet uses Tor through a network of proxies using the Socks5 protocol, abuses legitimate DevOps tools, and other emerging techniques....
On Sunday, Europol will end a three-month-long process of dismantling the Emotet botnet by triggering a time-activated .dll to delete...
The Cybersecurity and Infrastructure Security Agency (CISA) has reported finding the SUPERNOVA web shell collecting credentials on a SolarWinds Orion...
A written proposal to ban several uses of artificial intelligence (AI) and to place new oversight on other “high-risk” AI...
If you’ve been shopping for a VPN service in 2021, you’ve probably noticed how many providers are available. Using a...
Cookie – the term which most of you are familiar with. Every single time when you open a new website,...
A huge ransomware campaign seems to be underway to attack QNAP devices globally and customers can now locate their files...
The cybersecurity firm Trend Micro disclosed that the threat actors are once again using security solutions as attack vectors and...
Kaspersky has been following the ransomware landscape for years. In the past, we’ve published yearly reports on the subject: PC...
A new ransomware strain dubbed Qlocker is infecting hundreds of QNAP NAS devices every day and demanding a $550 ransom...
Evil Maid Attack – Weaponizing an harmless vacuum cleaner hiding within it a small Rogue Device such as a Raspberry...
The Darkside ransomware gang is enhancing its extortion tactics to interfere with the valuation of stocks of companies that are...
Mitre Engenuity – The Mitre Corporation’s tech foundation for public good – released the results of its independent evaluation of...
Urs Holzle, Senior Vice President for Technical Infrastructure at Google, speaks on the Google Cloud Platform during a Google I/O...
UAS, the biggest hacker platform for hacked RDP credentials, has leaked the login names and passwords for 1.3 million new...
Retail broking firm Upstox suffered a massive data breach affecting the personal data of 2.5 Mn of its customers, according...
The data of several hundred Russian companies that used the free online project manager Trello has been made publicly available....
In a persistent campaign that features malicious ads on tens of millions, if not hundreds of millions, computers, the criminals...
New England's largest energy provider, Eversource experienced a data breach after sensitive details of customers were exposed on an unsecured...
The importance of carrying out a careful risk and impact assessment in order to safeguard the security of the information...
Cellebrite mobile forensics tool Ufed contains multiple flaws that allow arbitrary code execution on the device, SIGNAL creator warns. Moxie...
Researchers from Human Security have uncovered a huge botnet of Android devices being used to conduct fraud in the connected...
Cybersecurity firm Trend Micro revealed that a threat actor is actively exploiting a flaw, tracked as CVE-2020-24557, in its antivirus solutions...