The notorious BlackBasta ransomware group is claiming credit for carrying out cyberattacks on major multinationals in the U.S. The ransomware…
Security
After a 14-year legal battle, WikiLeaks founder Julian Assange walked out of the United Kingdom’s Belmarsh prison Monday morning, where…
The European Union has extended its sanctions against threat actors after adding six Russian and Ukrainian nationals to its restrictive…
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) confirmed on Monday that a cyberattack in January may have compromised sensitive…
Threat actors are using a new attack technique that allows them to evade detection and gain full code execution of…
Cyble Research and Intelligence Labs (CRIL) researchers have observed the Russia-linked threat actor group UAC-0184 targeting Ukraine with the XWorm…
The National Health Laboratory Service (NHLS), South Africa’s primary diagnostic pathology service for public healthcare facilities, has fallen victim to…
Multiple WordPress plugins have been backdoored to inject malicious code that makes it possible to create rogue administrator accounts with…
WikiLeaks founder Julian Assange has been freed in the U.K. and has departed the country after serving more than five…
Four Vietnamese nationals with ties to the FIN9 cybercrime group have been indicted in the U.S. for their involvement in…
Meet Zakir Hussain Rangwala, CEO of BD Software Distribution Pvt. Ltd., a seasoned expert with over two decades in the…
A new supply chain attack has impacted several plugins hosted on WordPress.org. This WordPress vulnerability, discovered on June 24th, 2024,…
The National Central Bureau (NCB) Buenos Aires, a vital division of Interpol in Argentina, has been listed by a dark…
The infamous cybercrime marketplace BreachForums faced an awkward scenario on June 25, 2024, when a threat actor leaked unverified information…
A previously undocumented threat actor dubbed Boolka has been observed compromising websites with malicious scripts to deliver a modular trojan…
Browser security is becoming increasingly popular, as organizations understand the need to protect at the point of risk – the…
Threat actors are exploiting a novel attack technique in the wild that leverages specially crafted management saved console (MSC) files…
A security threat has surfaced on dark web forums: a zero-day exploit targeting a use-after-free (UAF) vulnerability in the Linux…
Cyber hygiene encompasses all practices and steps taken to prevent your accounts and devices from becoming vulnerable to cyber threats.…
When transitioning to remote work, the dynamics drastically change from working within a dedicated office environment tailored to the tasks…