30 Docker images downloaded 20M times in cryptojacking attacks
Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo...
Experts discovered that 30 malicious Docker images with a total number of 20 million pulls were involved in cryptomining operations. Palo...
Harris Federation, the multi-academy trust of 50 primary and secondary academies in and around London, was hit by a ransomware...
China-linked APT group RedEcho has taken down its attack infrastructure after it was exposed at the end of February by...
For years, Apple has marketed its iPhone as the more secure, more private option when compared to other smart phones,...
The IT security researchers at AdaptiveMobile have called out what looks like an important vulnerability in the architecture of 5G...
Suppose that, out of the blue, a Steam user tells you they’ve accidentally reported you for something you didn’t do,...
Taiwanese firm, QNAP has warned its clients of ongoing attacks targeting QNAP NAS (network-attached storage) devices and urged to strengthen...
Insurance giant, CNA had to shut down its systems and temporarily close its website due to a novel ransomware attack....
The Commodity Futures Trading Commission on 26th March 2021 declared that the U.S. District Court for the Southern District of...
Introduction Doxing refers to the collection of confidential information about a person without their consent for the purpose of inflicting...
On Thursday, March 25, 2021, SolarWinds released fixes for four new vulnerabilities in their Orion platform, the most severe of...
This blog post is part of an ongoing series about evaluating Managed Detection and Response (MDR) providers. For more insights,...
Threat actors hacked the official Git server of the PHP programming language and pushed unauthorized updates to insert a backdoor...
Administrator of Ziggy ransomware recently announced the end of the operation, and now is promising that its victims will have...
Researchers from Guardicore have spotted a new variant of the Purple Fox Windows malware that implements worm-like propagation capabilities. Researchers...
A critical flaw in the official Facebook for WordPress plugin could be abused exploited for remote code execution attacks. Researchers...
This week on Lock and Code, we discuss the top security headlines generated right here on Labs. In addition, we...
According to the warning by GCHQ's cybersecurity arm, NCSC, there has been a substantial spike in the number of ransomware...
How many websites are hacked every day? How frequently do hackers attack? Are there any solutions to fix the vulnerabilities?...
Lindy Cameron, executive director of Britain's National Cyber Security Center (NCSC), said on Friday that the Russian Federation poses the...
A cyber attack has disrupted the Australian Channel Nine’s live broadcasts, the company was unable to transmit its Sunday morning news...
Taiwanese manufacturer QNAP published an alert urging its customers to secure their devices after a growing number of users reported...
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for...
According to a proposed executive order of the Biden administration, software vendors would have to disclose breaches to U.S. government...