Researchers observed a Kiosk mode bypass vulnerability in a remote hotel’s check-in terminal during their stay there while traveling to…
Security
Did your company fall victim to the LockBit ransomware? Have cybercriminals left gigabytes of your data encrypted, with no easy…
Senator Ron Wyden (D-Ore.) is pressing the U.S. government to accelerate cybersecurity enhancements within the healthcare sector following the devastating…
Security researchers have uncovered a new phishing campaign that attempts to trick recipients into pasting (CTRL+V) and executing malicious commands…
The Federal Communications Commission (FCC) today took steps to make internet use safer in the U.S., approving a $200 million…
On March 20, 2024, Progress Software disclosed three vulnerabilities in its Telerik Report Server products. The vulnerabilities were identified as…
Ukrainian cyber defenders uncovered the resurgence of Vermin hackers after a two-year hiatus. The hacker group is targeting the country’s…
Cybersecurity researchers have discovered a malicious Python package uploaded to the Python Package Index (PyPI) repository that’s designed to deliver…
The FBI has retrieved almost 7,000 decryption keys related to the LockBit operation, which affected thousands of businesses. After the…
Twenty-two Chinese nationals have pleaded guilty to cyber-related crimes in Zambia, Africa. They are among the 77 suspects, who were…
A Chinese research team identified a severe security flaw in the design of RISC-V processors, posing a threat to China’s…
Google has announced plans to store Maps Timeline data locally on users’ devices instead of their Google account effective December…
New York-based cyber risk ratings vendor SecurityScorecard has filed a lawsuit against its cyber risk management rival Safe Security for…
A hack on Malaysia’s Railway Assets Corporation (RAC) has been reported by a dark web actor. The key entity under…
Advance Auto Parts, Inc., a significant provider of automobile aftermarket components, has allegedly suffered a massive data breach. A threat…
Threat actors are increasingly abusing legitimate and commercially available packer software such as BoxedApp to evade detection and distribute malware…
Tom works for a reputable financial institution. He has a long, complex password that would be near-impossible to guess. He’s…
Drones, some coloured cardboard, and a piece of tinfoil may be all the kit you need to crash a robot-driven…
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill’s threat experts. Each…
The Akira ransomware group allegedly targeted E-T-A Elektrotechnische Apparate GmbH, an organization located in Germany. The ransomware group claims to…