Massive Utility Scam Campaign Spreads Via Online Ads
For many households, energy costs represent a significant part of their overall budget. And when customers want to discuss their...
For many households, energy costs represent a significant part of their overall budget. And when customers want to discuss their...
This article is based on research by Marcelo Rivero, Malwarebytes’ ransomware specialist, who monitors information published by ransomware gangs on...
Image: Midjourney Russian military hackers are using compromised Ubiquiti EdgeRouters to evade detection, the FBI says in a joint advisory...
The story incorrectly stated that the Hessen state in Germany was attacked. The story has been updated to clarify that...
Malicious JavaScript code hidden in a Tornado Cash governance proposal has been leaking deposit notes and data to a private...
Today, the FBI, CISA, and the Department of Health and Human Services (HHS) warned U.S. healthcare organizations of targeted ALPHV/Blackcat...
Image: Cencora (Previously known as AmerisourceBergen)Pharmaceutical giant Cencora says they suffered a cyberattack where threat actors stole data from corporate IT...
The Phishing as a Service (PhaaS) platform 'LabHost' has been helping cybercriminals target North American banks, particularly financial institutes in...
Image: Midjourney Microsoft says the February 2024 updates fail to install on Windows 11 22H2 and 23H2 systems, with 0x800F0922...
Image: Midjourney The Black Basta and Bl00dy ransomware gangs have joined widespread attacks targeting ScreenConnect servers unpatched against a maximum...
Three-quarters (74%) of commercial codebases contain open source components featuring “high-risk” vulnerabilities, according to a new study from Synopsys.The chip...
Over two-thirds (69%) of organizations experienced a successful ransomware incident in the past year, according to Proofpoint’s 2024 State of...
APIs now comprise nearly three-quarters (71%) of web traffic, posing a significant threat to corporate cybersecurity by expanding the cyber-attack...
Half of all IT leaders believe that the Internet of Things (IoT) is the weakest part of their security efforts,...
The US National Institute of Standards and Technology (NIST) has released the final version of version 2.0 of its popular...
France’s National Cybersecurity Agency (ANSSI) observed a significant rise in cyber espionage campaigns targeting strategic organizations in 2023.These operations are...
Cybersecurity researchers have discovered a significant vulnerability in the LiteSpeed Cache plugin for WordPress.The vulnerability affects the LiteSpeed Cache plugin, which...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Image: Midjourney Members of the Five Eyes (FVEY) intelligence alliance warned today that APT29 Russian Foreign Intelligence Service (SVR) hackers...
Steel giant ThyssenKrupp confirms that hackers breached systems in its Automotive division last week, forcing them to shut down IT systems...
A massive ad fraud campaign named "SubdoMailing" is using over 8,000 legitimate internet domains and 13,000 subdomains to send up...
A cyberattack on UnitedHealth Group subsidiary Optum that led to an ongoing outage impacting the Change Healthcare payment exchange platform was linked...
Organizations recognize the cybersecurity risks posed by their end-users, so they invest in security and awareness training programs to help...
A hacking group tracked as 'UAC-0184' was observed utilizing steganographic image files to deliver the Remcos remote access trojan (RAT)...