Over 28 500 Exchange Servers Vulnerable To Actively Exploited Bug
Up to 97,000 Microsoft Exchange servers may be vulnerable to a critical severity privilege escalation flaw tracked as CVE-2024-21410 that hackers are...
Up to 97,000 Microsoft Exchange servers may be vulnerable to a critical severity privilege escalation flaw tracked as CVE-2024-21410 that hackers are...
Hackers are actively exploiting a critical remote code execution (RCE) flaw impacting the Brick Builder Theme to run malicious PHP...
Ukraine's cyber police arrested a 31-year-old for running a cybercrime operation that gained access to bank accounts of American and...
The FBI took down a botnet of small office/home office (SOHO) routers used by Russia's Main Intelligence Directorate of the...
A serious vulnerability named KeyTrap in the Domain Name System Security Extensions (DNSSEC) feature could be exploited to deny internet access...
Wyze Labs is investigating a security issue while experiencing a service outage that has been causing connectivity issues since this...
The ALPHV/Blackcat ransomware gang has claimed responsibility for the recent network breaches of Fortune 500 company Prudential Financial and mortgage...
The North Korean hacker collective Lazarus, infamous for having carried out numerous large-scale cryptocurrency heists over the years, has switched...
SolarWinds has patched five remote code execution (RCE) flaws in its Access Rights Manager (ARM) solution, including three critical severity...
Security researchers analyzing the Alpha ransomware payload and modus operandi discovered overlaps with the now-defunct Netwalker ransomware operation. Netwalker was a prolific...
Organizations based in the EU are being targeted by spear phishing campaigns leveraging EU political and diplomatic events, according to...
The developer of Qakbot malware, or someone with access to the source code, seems to be experimenting with new builds as fresh samples...
Thousands of Ivanti Connect Secure and Policy Secure endpoints remain vulnerable to multiple security issues first disclosed more than a...
In today's interconnected world, web application security is crucial for business continuity. Yet, web application attacks are now involved in...
A new iOS and Android trojan named 'GoldPickaxe' employs a social engineering scheme to trick victims into scanning their faces...
Security researchers have identified and analyzed new malware they call TinyTurla-NG and TurlaPower-NG used by the Russian hacker group Turla...
The U.S. State Department is offering rewards of up to $10 million for information that could lead to the identification...
The RansomHouse ransomware operation has created a new tool named 'MrAgent' that automates the deployment of its data encrypter across multiple VMware...
Ukrainian national Vyacheslav Igorevich Penchukov, one of the heads of the notorious JabberZeus cybercrime gang, has pleaded guilty to charges...
The FBI took down a botnet of small office/home office (SOHO) routers used by Russia's Main Intelligence Directorate of the...
OpenAI has removed accounts used by state-sponsored threat groups from Iran, North Korea, China, and Russia, that were abusing its...
A logic flaw between Ubuntu's 'command-not-found' package suggestion system and the snap package repository could enable attackers to promote malicious...
Battery maker VARTA AG announced yesterday that it was targeted by a cyberattack that forced it to shut down IT...
The Zoom desktop and VDI clients and the Meeting SDK for Windows are vulnerable to an improper input validation flaw...