Patchwork Hackers Target Bhutan with Advanced Brute Ratel C4 Tool
The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties to Bhutan to...
The threat actor known as Patchwork has been linked to a cyber attack targeting entities with ties to Bhutan to...
Cybersecurity firm CrowdStrike on Wednesday blamed an issue in its validation system for causing millions of Windows devices to crash...
There is one simple driver behind the modern explosion in SaaS adoption: productivity. We have reached an era where purpose-built...
A zero-day security flaw in Telegram's mobile app for Android called EvilVideo made it possible for attackers to malicious files...
A now-patched security flaw in the Microsoft Defender SmartScreen has been exploited as part of a new campaign designed to...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two security flaws to its Known Exploited Vulnerabilities (KEV) catalog,...
Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking...
A vulnerability has been identified in Microsoft Internet Explorer, which can be exploited by malicious people to compromise a user's...
Prolific Chinese espionage group Daggerfly (aka Evasive Panda, Bronze Highland) has extensively updated its malware toolkit, increasing its abilities to...
UK law enforcement agencies have infiltrated and taken down DigitallStress, the world’s most prolific underground marketplace offering distributed denial of...
Russia’s cyber activities in Ukraine have shifted away from strategic civilian targets towards pursuing tactical military objectives, according to a...
Organizations in Taiwan and a U.S. non-governmental organization (NGO) based in China have been targeted by a Beijing-affiliated state-sponsored hacking...
The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a scientific research institution in...
Cybersecurity researchers have discovered what they say is the ninth Industrial Control Systems (ICS)-focused malware that has been used in...
The initial onboarding stage is a crucial step for both employees and employers. However, this process often involves the practice...
Threat actors have been observed using swap files in compromised websites to conceal a persistent credit card skimmer and harvest...
Meta has been given time till September 1, 2024, to respond to concerns raised by the European Commission over its...
Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four years...
On 19 Jul 2024, CrowdStrike Falcon Sensor caused crashes on Windows hosts. Windows hosts running on cloud such as Azure,...
The Play ransomware group has introduced a Linux variant of its malware that specifically targets VMWare ESXi environments, according to...
Two Russian nationals have pleaded guilty to their participation in the notorious LockBit ransomware gang, the US Department of Justice...
Ransomware groups have become increasingly fragmented due to recent law enforcement action according to data comes from Europol’s latest Internet...
Cybercriminals are leveraging the ongoing mass global IT outage to launch phishing campaigns, according to reports.CrowdStrike Intelligence warned that threat...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...