New macOS Backdoor Threat from North Korean Hackers
Jan 05, 2024NewsroomEndpoint Security / Malware Cybersecurity researchers have discovered a new Apple macOS backdoor called SpectralBlur that overlaps with a known malware family that…
Jan 05, 2024NewsroomEndpoint Security / Malware Cybersecurity researchers have discovered a new Apple macOS backdoor called SpectralBlur that overlaps with a known malware family that…
The source code of Zeppelin Ransomware sold on a hacking forum Pierluigi Paganini January 05, 2024 A threat actor announced the sale of the source…
The Memorial University of Newfoundland (MUN) continues to deal with the effects of a cyberattack that occurred in late December and postponed the start of…
23andMe, renowned for its DNA testing and analysis services, has issued a statement placing blame on its users for a data breach that occurred last…
Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months Pierluigi Paganini January 05, 2024 Ukrainian authorities revealed that Russia-linked APT Sandworm had been inside…
Ethical hacking is a useful skill set not just for cybersecurity experts, but for every IT worker. The Ultimate 2020 White Hat Hacker Certification Bundle…
A crypto wallet service co-founder shares with the world his agony after losing $125,000 to a crypto scam. The startup CEO, who at the time…
The hacking group Phoenix has claimed responsibility for a Distributed Denial of Service (DDoS) attack on the website of the US Congress. The hacker group…
Beyond the web, trackers embedded in your mobile applications can gather data on your activity. On Android, you should turn off personalized ads through Google’s…
Ivanti fixed a critical EPM flaw that can result in remote code execution Pierluigi Paganini January 05, 2024 Ivanti fixed a critical vulnerability in its…
The DCBOE is under intense scrutiny regarding the October 2023 DC Election data breach. The two House Republicans, Representatives Bryan Steil (R-Wis.) and Laurel Lee…
The digital landscape, once a serene meadow, has morphed into a battleground where attackers and security vendors engage in a perpetual arms race. As defenses…