Home

img

Lee Newspaper Breach Credited To Quilin Cybercrime Ring...

The Criminal Outfit Known As Ransomware -As-A-Service (RaaS) Promises That It Would Release The Stolen Data In Two Days, But Stran...

Desert Dexter's AsyncRAT Campaign Targets Middle East a...

A new cyber campaign deploying a modified version of the AsyncRAT malware has been targeting users across the Middle East and Nort...

Blind Eagle APT Exploits Windows Vulnerability in High-...

A threat actor suspected to originate from South America, known as Blind Eagle (APT-C-36), has been actively targeting Colombian g...

Enhancing ICS Security: The Rise of Threat Modeling Fra...

As research into device and industrial control system (ICS) security advances, frameworks designed to help manufacturers identify ...

U.S. and International Authorities Seize Crypto Exchang...

A coalition of international law enforcement agencies has taken down the website of Garantex, a cryptocurrency exchange that had b...

Microsoft Uncovers Massive Malvertising Campaign Target...

Microsoft has revealed details of a large-scale malvertising campaign that has impacted over one million devices worldwide, aiming...

Using An Exploit Chain, Serbian Police Hack A Protester...

According To Amnesty International, The Hack Raises Concerns About Ethical Technology Development Since Serbian Police Employed An...

Elastic Patches Critical Kibana Vulnerability Allowing ...

Elastic has released security updates to fix a critical vulnerability in Kibana, the data visualization dashboard for Elasticsearc...

Bybit $1.5B Crypto Heist Linked to North Korean Hackers...

Cybersecurity firm Safe{Wallet} has identified the Bybit $1.5 billion cryptocurrency heist as a highly advanced, state-sponsored a...

China-Linked Silk Typhoon Hackers Shift Focus to IT Sup...

The Silk Typhoon hacking group, previously known as Hafnium, has evolved its tactics, now targeting IT supply chains to gain entry...

Google Introduces AI-Powered Scam Detection for Android...

Google has unveiled new AI-driven scam detection features for Android devices, aimed at safeguarding users from fraudulent schemes...

Lotus Panda Expands Cyber Espionage Operations with Upg...

A Chinese state-backed hacking group, known as Lotus Panda (aka Billbug, Lotus Blossom, Bronze Elgin, Spring Dragon, and Thrip), h...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.