LockBit 2.0, the first ransomware that uses group policies to encrypt Windows domains
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers...
A new variant of the LockBit 2.0 ransomware is now able to encrypt Windows domains by using Active Directory group policies. Researchers...
Experts disclose details about a critical flaw in Microsoft Hyper-V, tracked as CVE-2021-28476, that can allow executing arbitrary code on...
A joint report published by US, UK, and Australian cyber security agencies warns of the top routinely exploited vulnerabilities in...
A China-linked cyberespionage group, tracked as PKPLUG, employed a previously undocumented strain of a RAT dubbed THOR in recent attacks....
There’s a new ransomware gang in town—and, frankly, we’re not at all surprised. After DarkSide disappeared—coincidentally, immediately after Colonial Pipeline...
The 2020 Olympics are, after a bit of a delayed start, officially in full swing. So too is the possibility...
Researchers at RandoriSec have found serious vulnerabilities in the firmware provided by UDP Technology to Geutebrück and many other IP...
Signal has patched a critical flaw in its Android app that, in some circumstances, sent random unintended images to contacts...
Malicious malware and websites have targeted both event organizers and regular spectators as the Tokyo Olympics' opening ceremony approaches. According to...
Another latest spam E-mail operation, which abused a technique named "HTML smuggling" to circumvent E-mail security measures and transmit malware...
Although Windows 11 isn't expected to be released until later this year, hackers have already begun attempting to use it...
News overview In terms of big news, Q2 2021 was relatively calm, but not completely eventless. For example, April saw the...
CredPhish is a PowerShell script designed to invoke credential prompts and exfiltrate passwords. It relies on CredentialPicker to collect user...
LoGiC.NET is a free and open-source .NET obfuscator that uses dnlib for folks that want to see how obfuscation works...
The ‘Cost of a Data Breach’ report commissioned by IBM Security states that the cost of a data breach exceeded...
BlackMatter ransomware gang, a new threat actor appears in the threat landscape and claims to combine TTPs of Darkside and...
Researchers discovered flaws in Zimbra email collaboration software that could allow attackers to compromise email accounts by sending a malicious...
It must not be easy to work at Kaseya right now. While they are working as hard as they can...
Before the work week ended last week Friday, a security researcher found a leak of what is claimed to be...
The officials of Mobile County in southwest Alabama, have finally notified county employees of a computer system breach that compromised...
Q2 2021 was among the most important ransomware periods, with several significant events taking place. Humans witnessed one of the...
According to WhatsApp CEO Will Cathcart, governments used NSO group malware to target high-ranking government officials all around the world. Cathcart...
On a hacking forum, a threat actor has begun selling the confidential database of Clubhouse, which contains 3.8 billion phone...
The MITRE Corporation, one of the most respected organizations in the cybersecurity field, has released D3FEND, a complementary framework to...