A threat actor has claimed responsibility for breaching the database of CoinGeck...
EBooks are popular, and their popularity lucrative threat actors the most, as th...
DarkGate, a Malware-as-a-Service (MaaS) platform, experienced a surge in activit...
Airlines often become the target of hackers as they contain sensitive personal a...
Hackers often target NuGet as it’s a popular package manager for .NET, which dev...
ViperSoftX is an advanced malware that has become more complicated since its rec...
A Houthi-aligned group has been deploying Android surveillanceware called GuardZ...
The Monetary Authority of Singapore (MAS) and The Association of Banks in Singap...
A critical vulnerability has been discovered in the Cellopoint Secure Email Gate...
Cybercriminals use Facebook business pages and advertisements to promote fake Wi...
Microsoft has confirmed that Windows Server updates from last month's Patch Tues...
The SEXi ransomware operation, known for targeting VMware ESXi servers, has rebr...
Microsoft has provided a temporary workaround for a known issue preventing the M...
Threat actors commonly use Living Off The Land (LOTL) techniques to evade detect...
Microsoft has resolved a known issue caused by the June 2024 KB5039302 preview u...
Threat actors are quick to weaponize available proof-of-concept (PoC) exploits i...