The Saline Water Conversion Corporation of Saudi Arabia became the target of a Distributed Denial of Service (DDoS) attack allegedly…
Security
Google on Monday revealed that almost 200,000 app submissions to its Play Store for Android were either rejected or remediated…
A security vulnerability has been discovered in the R programming language that could be exploited by a threat actor to create a…
It comes as no surprise that today’s cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics…
A previously undocumented cyber threat dubbed Muddling Meerkat has been observed undertaking sophisticated domain name system (DNS) activities in a likely effort to evade…
Hacktivists claimed breaching the network of Belarusian intelligence agency and allegedly leaked their data in response to the intelligence chief’s…
The notorious Hunters group has allegedly added two new victims to their dark web portal: Rocky Mountain Sales in the…
The threat actor USDoD claimed that they had published the Personally Identifiable Information (PII) of about 2 million members of…
A threat actor purports to be selling the database of the Central Bank of Argentina on a hackers’ forum. The…
Multiple critical security flaws have been disclosed in the Judge0 open-source online code execution system that could be exploited to obtain code execution on…
Okta reported an “unprecedented scale” of credential stuffing attacks targeting its identity and access management solutions, resulting in the breach…
The notorious NoName ransomware group this time has allegedly set its sights on Moldova, targeting key government websites in what…
Identity and access management (IAM) services provider Okta has warned of a spike in the “frequency and scale” of credential…
CRIL Researchers observed a new android banking trojan ‘Brokewell,’ being distributed through a phishing site disguised as the official Chrome…
Hackers have honed in on a critical WP-Automatic plugin vulnerability, aiming to infiltrate WordPress websites by creating unauthorized admin accounts, according…
This week’s TCE Cyberwatch delves into a range of pressing cybersecurity issues impacting the world today. From the rise of…
Cybersecurity researchers have discovered a targeted operation against Ukraine that has been found leveraging a nearly seven-year-old flaw in Microsoft Office to…
By Lakshmi Mittra, SVP and Head, Clover Academy In the rapidly changing and dynamic tech environment of today, future-proofing the…
By Roman Faithfull, Cyber Intelligence Lead, Cyjax 2024 will see more elections than any other year in history: the UK,…
An ongoing social engineering campaign is targeting software developers with bogus npm packages under the guise of a job interview to trick…