Malspam campaign uses icon files to delivers NanoCore RAT
Researchers at Trustwave spotted a new malspam campaign that is abusing icon files to trick victims into installing the NanoCore...
Researchers at Trustwave spotted a new malspam campaign that is abusing icon files to trick victims into installing the NanoCore...
This week a security researcher published on GitHub a proof-of-concept tool to hack Microsoft Exchange servers chaining two of ProxyLogon...
At the moment, I’m really torn, and I need your help. Let me tell you what is going on. I...
Virtual Private Networks (VPNs) are popular but often misunderstood. There are many misconceptions about them—misconceptions that may be stopping people...
The Federal Service for Supervision of Communications, Information Technology and Mass Media (Roskomnadzor) accused Twitter of numerous violations and failure...
The Telecom Regulatory Authority of India (TRAI) has temporarily suspended its new rules for curbing spam messages, following major disruptions...
One specific aspect of malware and one vulnerability continues to develop as security companies have been reconstructing the highest trends...
GitHub on Monday informed clients that it had found what it described as an “extremely rare, but potentially serious” security...
2020 was a tumultuous year for vulnerability risk management. Defenders had to contend with a growing volume of high-priority security...
Norway parliament, the Storting, has suffered a new cyberattack, hackers stole data by exploiting recently disclosed Microsoft Exchange vulnerabilities. Norway...
Intezer experts have spotted a new strain of Linux backdoor dubbed RedXOR that is believed to be part of the...
Security firm F5 announced the availability of patches for seven vulnerabilities in BIG-IP, four of which have been rated as...
A group of hackers claimed to have compromised more than 150,000 surveillance cameras at banks, jails, schools, and prominent companies...
Video and audio are huge privacy concerns for people. If something goes wrong with tech it can have major ramifications....
A fire in one of the OVH datacenters has destroyed one datacenter and knocked two others offline. It took 100...
The New York Times previously reported that the United States plans to carry out cyber attacks on the internal systems...
Threat actors prevented the Williams Formula 1 team from giving fans a first look at their car’s latest version via...
A persistent 'cyber incident' occurred at the University of the Highlands and Islands, which disrupted its services and networks on...
Verkada, a Silicon Valley security start-up that gives cloud-based security camera services, has witnessed a massive security breach. Hackers accessed...
A significant EU financial regulator, the EU Banking Authority said that it suffered a cyberattack where its Microsoft email systems...
Some time ago, we discovered a number of fake apps delivering a Monero cryptocurrency miner to user computers. They are...
We’re excited to announce we have expanded the Network Traffic Analysis (NTA) capabilities in InsightIDR to support Amazon Web Services...
OVH, the largest hosting provider in Europe, has suffered a terrible fire that destroyed the data centers located in Strasbourg. OVH,...
Researchers from the Wordfence team found a critical vulnerability in The Plus Addons for Elementor WordPress plugin that could be...