Veeam has published a critical advisory regarding severe vulnerabilities affecting its Veeam Service Provider Console (VSPC), particularly impacting version 8.1.0.21377…
Development
A previously undocumented threat activity cluster dubbed Earth Minotaur is leveraging the MOONSHINE exploit kit and an unreported Android-cum-Windows backdoor…
Vulnerability Management (VM) has long been a cornerstone of organizational cybersecurity. Nearly as old as the discipline of cybersecurity itself,…
Europol on Thursday announced the shutdown of a clearnet marketplace called Manson Market that facilitated online fraud on a large…
Cybersecurity researchers have released a proof-of-concept (PoC) exploit that strings together a now-patched critical security flaw impacting Mitel MiCollab with…
Pro tip for hackers: Don’t threaten people whose specialty is uncovering the identity of cybercriminals. That mistake apparently led to…
As many as 77 banking institutions, cryptocurrency exchanges, and national organizations have become the target of a newly discovered Android…
The UK’s National Crime Agency (NCA) has revealed details of Operation Destabilise, a years-long international law enforcement investigation into a…
In a recent analysis by Cyble Research and Intelligence Labs (CRIL), a multi-stage cyberattack campaign has been identified, targeting the…
The threat actor known as Gamaredon has been observed leveraging Cloudflare Tunnels as a tactic to conceal its staging infrastructure…
The threat actors behind the More_eggs malware have been linked to two new malware families, indicating an expansion of its…
The modern business landscape is thrilling yet daunting. Rapidly evolving technology, persistent cyberthreats and escalating operational complexities make data protection…
Cybersecurity researchers have disclosed multiple security flaws impacting open-source machine learning (ML) tools and frameworks such as MLflow, H2O, PyTorch,…
A new report from the European Union Agency for Cybersecurity (ENISA) offers critical insights into the state of European Union…
A Russian programmer accused of donating money to Ukraine had his Android device secretly implanted with spyware by the Federal…
Last month’s attack on supply chain management platform Blue Yonder has been attributed to a new ransomware group known as…
Cyble dark web researchers have documented a new Russia-linked threat group that has been breaching critical infrastructure environments and tampering…
In a historic decision, Romania’s constitutional court has annulled the result of the first round of voting in the presidential…
Cybersecurity researchers have warned of a new scam campaign that leverages fake video conferencing apps to deliver an information stealer…
Cybercriminals know that privileged accounts are the keys to your kingdom. One compromised account can lead to stolen data, disrupted…