Sorillus RAT and Phishing Attacks Exploit Google Firebase Hosting
Attackers have been observed using the notorious Sorillus remote access trojan (RAT) and phishing attacks to exploit Google Firebase Hosting infrastructure.The...
Attackers have been observed using the notorious Sorillus remote access trojan (RAT) and phishing attacks to exploit Google Firebase Hosting infrastructure.The...
Conor Brian Fitzpatrick, famously known as "Pompompurin," has entered a guilty plea for hacking charges in the United States District...
The Ukrainian government's Computer Emergency Response Team (CERT-UA) has recently unveiled the rapid data theft methods of the APT known...
A Russian security agent has been charged with smuggling ammunition and dual-use technology, including various electronics which helped the Kremlin...
A new discussion paper has set out recommendations for the European Union (EU) on how to ensure member states are...
The acting US national cyber director has reportedly withdrawn her name for consideration for the permanent role because she was...
A US provider of healthcare software has agreed to pay $31m to settle allegations it broke the False Claims Act...
Global email-based extortion scams are the work of just a small group of fraudsters, new research from Barracuda Networks has...
Drawing on its tracking of Russia-backed disruptive operations against Ukraine since the country’s invasion of its neighbor in February 2022,...
The White House has published a plan for the implementation of the US National Cybersecurity Strategy, which was introduced in...
This year could be another record breaker for data compromise following 951 publicly reported incidents in the second quarter, a...
A leading UK security agency has revealed several approaches that could reduce or eliminate the need for organizations to run...
The UK’s financial services regulator has warned banks that it will be watching closely what steps they put in place...
Global financial services organizations have lost over $32bn in downtime since 2018 due to ransomware breaches, a new report has...
A new version of the Common Vulnerability Scoring System (CVSS 4.0) has been unveiled publicly by the Forum of Incident...
A new threat actor group has been observed conducting a series of cyber-attacks targeting government entities, military organizations and civilian...
Windows users have been targeted again by the sophisticated malware known as LokiBot, which is spreading through malicious Office documents. According...
A generative AI tool, WormGPT, has emerged as a powerful weapon in the hands of cyber-criminals, specifically for launching business...
Trend Micro has discovered a sample of Shadowpad, a sophisticated backdoor used by various Chinese-sponsored threat actors, in an application...
A malware variant targeting the macOS community has been recently identified in the wild, highlighting the ongoing evolution and adaptability...
The rapid advancement in technology persists, and alongside this progress, the risk of cyber threats continues to escalate. Bolstering your...
Beware as ransomware actors continue to grab headlines! On one hand, the notorious BlackCat ransomware group has been observed propagating...
Another ransomware got Linux-ed! Threat actors behind the Akira ransomware have reportedly widened their range of targets by launching the...
In a recent development highlighting the persistent threat of SQL injection vulnerabilities, critical flaws have been discovered in Gentoo Soko....