admin
February 28, 2023
Romanian cybersecurity company Bitdefender has released a free decryptor for a new ransomware strain known as MortalKombat.
MortalKombat is a new...
admin
February 28, 2023
A new post-exploitation framework called EXFILTRATOR-22 (aka EX-22) has emerged in the wild with the goal of...
admin
February 28, 2023
As digital transformation takes hold and businesses become increasingly reliant on digital services, it has become more...
admin
February 28, 2023
The threat actor known as Blind Eagle has been linked to a new campaign targeting various key...
admin
February 28, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a high-severity flaw affecting the ZK Framework to its...
admin
February 28, 2023
LastPass, which in December 2022 disclosed a severe data breach that allowed threat actors to access encrypted...
admin
February 27, 2023
The RIG exploit kit (EK) touched an all-time high successful exploitation rate of nearly 30% in 2022,...
admin
February 27, 2023
Spoiler Alert: Organizations with 10,000 SaaS users that use M365 and Google Workspace average over 4,371 additional...
admin
February 27, 2023
A new ChromeLoader malware campaign has been observed being distributed via virtual hard disk (VHD) files, marking...
admin
February 27, 2023
Government entities in Asia-Pacific and North America are being targeted by an unknown threat actor with an...
admin
February 27, 2023
The PlugX remote access trojan has been observed masquerading as an open source Windows debugger tool called x64dbg in...
admin
February 27, 2023
The Dutch police announced the arrest of three individuals in connection with a "large-scale" criminal operation involving...
admin
February 24, 2023
Google said it's working with ecosystem partners to harden the security of firmware that interacts with Android.
While...
admin
February 24, 2023
Are you prepared to tackle the top SaaS challenges of 2023? With high-profile data breaches affecting major...
admin
February 24, 2023
The use of AI in cybersecurity is growing rapidly and is having a significant impact on threat...
admin
February 24, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals to increase their cyber...
admin
February 24, 2023
An investigation into data safety labels for Android apps available on the Google Play Store has uncovered...
admin
February 23, 2023
A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely used by...
admin
February 23, 2023
Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining malware on macOS systems.
Jamf...
admin
February 23, 2023
Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho ManageEngine...
