RSS

Threat Actor Claims Selling of Dell Database with 49M U...

A threat actor reportedly sells a database containing 49 million user records fr...

Redline Malware Using Lua Bytecode to Challenge the SOC...

The first instance of Redline using such a method is in a new variant of Redline...

Change Healthcare hacked using stolen Citrix account wi...

UnitedHealth confirms that Change Healthcare's network was breached by the Black...

New Wpeeper Android malware hides behind hacked WordPre...

A new Android backdoor malware named 'Wpeeper' has been spotted in at least two ...

Google Prevented 2.28 Million Malicious Apps from Reach...

Google on Monday revealed that almost 200,000 app submissions to its Play Store ...

Hackers Took 29 Days from Initial Hack to Sabotage Rans...

Cybersecurity experts have meticulously traced the timeline of a sophisticated r...

London Drugs pharmacy chain closes stores after cyberat...

​Canadian pharmacy chain London Drugs has closed all its retail stores to contai...

FCC fines carriers $200 million for illegally sharing u...

​The Federal Communications Commission (FCC) has fined the largest U.S. wireless...

Muddling Meerkat hackers manipulate DNS using China’s G...

A new cluster of activity tracked as "Muddling Meerkat" is believed to be linked...

Sandbox Escape Vulnerabilities in Judge0 Expose Systems...

Multiple critical security flaws have been disclosed in the Judge0 open-source o...

New R Programming Vulnerability Exposes Projects to Sup...

A security vulnerability has been discovered in the R programming language that ...

Navigating the Threat Landscape: Understanding Exposure...

It comes as no surprise that today's cyber threats are orders of magnitude more ...

China-Linked 'Muddling Meerkat' Hijacks DNS to Map Inte...

A previously undocumented cyber threat dubbed Muddling Meerkat has been observed...

Fileless .NET Based Code Injection Attack Delivers Agen...

A recent malware campaign used a VBA macro in a Word document to download and ex...

Android Malware Brokewell With Complete Device Takeover...

A new family of mobile malware known as “Brokewell” has been found to have a wid...

Okta Warns of Credential Stuffing Attacks Using Proxy S...

Okta has issued a warning about the increasing prevalence of credential-stuffing...