Clop begins naming alleged MOVEit victims
As it had previously threatened, the Clop cyber crime cartel has started publicly naming victims allegedly compromised via a SQL injection flaw in Progress Software’s…
As it had previously threatened, the Clop cyber crime cartel has started publicly naming victims allegedly compromised via a SQL injection flaw in Progress Software’s…
The recent attacks exploiting a zero-day vulnerability in a Barracuda Networks email security appliance have been attributed by Mandiant to a Chinese cyberespionage group. The…
Microsoft denies these allegations, claiming that Hold Security is mischaracterizing the agreement and dismissing the claims made by the cybersecurity firm in the lawsuit. The…
Jun 15, 2023The Hacker NewsBrowser Security / Data Security The revolutionary technology of GenAI tools, such as ChatGPT, has brought significant risks to organizations’ sensitive…
The UK’s National Cyber Security Centre (NCSC) has once again teamed up with its foreign counterparts, issuing a new joint advisory warning of the “enduring…
A newfound banking trojan named ‘Roamer’ has been found exploiting users on fraudulent cloud mining platforms. The scammers behind the Roamer banking trojan engage with…
Hot on the heels of a $6 million seed funding round, cybersecurity startup SquareX today announced a six-week bug bounty program focused on its new…
Saudi Arabia has long recognised the need to diversify its economy and minimise its exposure to fluctuations in the world’s appetite for oil, and one…
Exploit and vulnerability intelligence provider VulnCheck has issued a warning over fake security researcher accounts distributing malware disguised as zero-day exploits for popular software. The…
Jun 15, 2023Ravie LakshmananCyber War / Threat Intel The Russian threat actor known as Shuckworm has continued its cyber assault spree against Ukrainian entities in…
Thank you for joining! Access your Pro+ Content below. June 2023 CW APAC: Trend Watch – Artificial intelligence Share this item with your network: Businesses…
When ESG recently asked security professionals to identify the attributes of a mature threat intelligence program, the top response was “information dissemination with reports customized…