Hackers stole personnel records of software developer Wind River
The global leader of embedded system software Wind River Systems discloses a data breach that resulted in the theft of...
The global leader of embedded system software Wind River Systems discloses a data breach that resulted in the theft of...
Cyber Defense Magazine February 2021 Edition has arrived. We hope you enjoy this month’s edition…packed with over 108 pages of...
CloudSEK has discovered a post on a well-known database sharing forum advertising the PII of 500,000 Indian citizens. While the...
Back in the fall of 2020 threat actors started to massively exploit a vulnerability in the no-longer maintained Magento 1...
The community of British Mensa, which is popularly known for its people with high IQs, they have failed to...
Disconnecting Russia from the global network is possible, but the authorities have a plan of action in this case, said...
Researchers at ESET found that NoxPlayer's latest updated mechanism, which is an android emulator for macOS and Windows, was attacked...
The outsourcing company responsible for NHS Test and Trace system in the UK confirmed this week that it was targeted...
Recently the US FBI has noted an increase in phone calls that usually spoof the Bureau’s telephone number. The actors...
ESET experts uncovered a previously undocumented piece of malware that had been observed targeting high-performance computing clusters (HPC). ESET analyzed...
Ransomware operators are exploiting two VMWare ESXi vulnerabilities, CVE-2019-5544 and CVE-2020-3992, to encrypt virtual hard disks. Security experts are warning...
The U.S. CISA reveals that many of the victims of the SolarWinds hackers had no direct connection to SolarWinds. The...
Experts spotted a new Trickbot module that is used to scan local networks and make lateral movement inside the target...
Experts uncovered a new supply chain attack leveraging the update process of NoxPlayer, a free Android emulator for PCs and...
Ransomware gangs deciding to pack their bags and leave their life of crime is not new, but it is a...
The fear of scam messages may seem far now, and even distant. With the rise of well-engineered and sophisticated attacks...
US Cellular, which is a mobile network operator, has suffered a data breach after threat actors gained access to...
Cybersecurity experts have discovered an updated version of ‘Pro-Ocean malware’, this malware was used as a weapon by a cybercriminal...
DDoS- Distributed Denial of Service is a cyber attack on a specific server or network. It attempts to disrupt the...
A "persistent attacker group" with supposed connections to Hezbollah has retooled its malware arsenal with a new version of a...
This is "flawfinder" by David A. Wheeler. Flawfinder is a simple program that scans C/C++ source code and reports potential...
Fast Modular Web Interfaces BruteforcerInstallpython3 -m pip install -r requirements.txt Usage$ python3 web-brutator.py -h __ __ ___. __________ __ __...
Cyber-espionage and exploitation from nation-state-sanctioned actors have only become more prevalent in recent years, with recent examples including the SolarWinds...
Organizations around the globe continue to embrace the flexibility, speed, and agility of the cloud. Those that have adopted it...