Why the Things You Don’t Know about the Dark Web May Be Your Biggest Cybersecurity Threat

5 min read
admin
May 4, 2023
IT and cybersecurity teams are so inundated with security notifications and alerts within their own systems, it’s...
admin
May 4, 2023
Three different threat actors leveraged hundreds of elaborate fictitious personas on Facebook and Instagram to target individuals...
admin
May 4, 2023
Three new security flaws have been disclosed in Microsoft Azure API Management service that could be abused...
admin
May 4, 2023
Cybersecurity researchers have found a way to exploit a recently disclosed critical flaw in PaperCut servers in...
admin
May 4, 2023
Meta said it took steps to take down more than 1,000 malicious URLs from being shared across...
admin
May 3, 2023
Almost five months after Google added support for passkeys to its Chrome browser, the tech giant has begun rolling...
admin
May 3, 2023
A Chinese state-sponsored hacking outfit has resurfaced with a new campaign targeting government, healthcare, technology, and manufacturing...
admin
May 3, 2023
Almost half of MSP clients fell victim to a cyberattack within the last 12 months. In the...
admin
May 3, 2023
An international law enforcement operation has resulted in the arrest of 288 vendors who are believed to...
admin
May 3, 2023
Apple and Google have teamed up to work on a draft industry-wide specification that's designed to tackle safety risks and alert...
admin
May 3, 2023
Threat actors are actively exploiting an unpatched five-year-old flaw impacting TBK digital video recording (DVR) devices, according...
admin
May 3, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday released an Industrial Control Systems (ICS) advisory about a...
admin
May 2, 2023
The telecom industry has always been a tantalizing target for cybercriminals. The combination of interconnected networks, customer...
BouldSpy Android Spyware: Iranian Government’s Alleged Tool for Spying on Minority Groups

2 min read
admin
May 2, 2023
A new Android surveillanceware possibly used by the Iranian government has been used to spy on over...
admin
May 2, 2023
Cybersecurity researchers have uncovered weaknesses in a software implementation of the Border Gateway Protocol (BGP) that could...
admin
May 2, 2023
In yet another instance of how threat actors are abusing Google Ads to serve malware, a threat...
admin
May 2, 2023
The North Korean threat actor known as ScarCruft started experimenting with oversized LNK files as a delivery route for...
admin
May 2, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added three flaws to the Known Exploited Vulnerabilities (KEV) catalog,...
admin
May 1, 2023
An analysis of over 70 billion DNS records has led to the discovery of a new sophisticated...
admin
May 1, 2023
Just a few short years ago, lateral movement was a tactic confined to top APT cybercrime organizations...