admin
June 4, 2024
Cloud computing and analytics company Snowflake said a "limited number" of its customers have been singled out...
admin
June 4, 2024
Cyber attacks involving the DarkGate malware-as-a-service (MaaS) operation have shifted away from AutoIt scripts to an AutoHotkey...
admin
June 4, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Oracle...
admin
June 3, 2024
Cybersecurity researchers have uncovered a new suspicious package uploaded to the npm package registry that's designed to...
admin
June 3, 2024
Law enforcement authorities behind Operation Endgame are seeking information related to an individual who goes by the...
admin
June 3, 2024
Threat actors are evolving, yet Cyber Threat Intelligence (CTI) remains confined to each isolated point solution. Organizations...
admin
June 3, 2024
Now-patched authorization bypass issues impacting Cox modems could have been abused as a starting point to gain...
admin
June 3, 2024
The North Korea-linked threat actor known as Andariel has been observed using a new Golang-based backdoor called...
admin
June 3, 2024
Fake web browser updates are being used to deliver remote access trojans (RATs) and information stealer malware...
admin
June 1, 2024
Artificial Intelligence (AI) company Hugging Face on Friday disclosed that it detected unauthorized access to its Spaces...
admin
June 1, 2024
More than 600,000 small office/home office (SOHO) routers are estimated to have been bricked and taken offline...
admin
May 31, 2024
Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations across...
admin
May 31, 2024
Microsoft has emphasized the need for securing internet-exposed operational technology (OT) devices following a spate of cyber...
admin
May 31, 2024
The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks...
admin
May 31, 2024
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating...
admin
May 31, 2024
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux...
admin
May 30, 2024
Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could...
admin
May 30, 2024
Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by a Russia-aligned...
admin
May 30, 2024
A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to targeted attacks spanning various...
admin
May 30, 2024
The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting...