Credential Stuffing Attack Hits 72,000 Levi’s Accounts
Tens of thousands of Levi’s customers may have had their accounts compromised after a credential stuffing attack, the clothing giant...
Tens of thousands of Levi’s customers may have had their accounts compromised after a credential stuffing attack, the clothing giant...
A popular cryptocurrency portfolio management specialist has revealed a major cyber-attack which impacted 1590 of its customers’ crypto wallets.CoinStats describes...
Vulnerability researchers at Google’s Project Zero have introduced Naptime, a new framework that will be used to enable a large...
Security researchers have uncovered a significant increase in dark web activity involving stolen identity information from Singapore citizens. In an advisory...
New fraud campaigns have been discovered involving the Medusa (TangleBot) banking Trojan, which had evaded detection for nearly a year. An...
Nearly half (44%) of organizations have experienced a cloud data breach, with 14% reporting having had an incident in the...
Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk - the...
A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver a modular trojan...
Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files...
WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five...
Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts with...
Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in...
The organization managing the world’s largest stockpile of plutonium has pleaded guilty to all criminal charges, in a first-of-its-kind case...
Security researchers have warned against Rafel, an open-source remote administration tool (RAT) targeting Android devices. The investigation by Check Point Research...
Poland’s new government appears to be ramping up its investigation into allegations that the previous administration used notorious commercial spyware...
RedJuliett, a likely Chinese state-sponsored group, conducted cyber espionage campaigns targeting Taiwan from November 2023 to April 2024, according to...
Security researchers from Group-IB have unveiled the operations of a threat actor known as Boolka, whose activities involve deploying sophisticated...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Cybersecurity researchers have detailed a now-patch security flaw affecting the Ollama open-source artificial intelligence (AI) infrastructure platform that could be...
Google has developed a new framework called Project Naptime that it says enables a large language model (LLM) to carry...
Security researchers have disclosed a critical vulnerability (CVE-2024-36680) involving a premium Facebook module for PrestaShop named pkfacebook. The vulnerability has...
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts. Each...
A likely China-linked state-sponsored threat actor has been linked to a cyber espionage campaign targeting government, academic, technology, and diplomatic...
Multiple threat actors, including cyber espionage groups, are employing an open-source Android remote administration tool called Rafel RAT to meet...