332 Million Email Addresses Scraped from SOCRadar.io Dumped Online
A hacker known as USDoD claims to have scraped 332 million email addresses from SOCRadar.io, which were later dumped online by another threat actor, Dominatrix.…
A hacker known as USDoD claims to have scraped 332 million email addresses from SOCRadar.io, which were later dumped online by another threat actor, Dominatrix.…
Volexity, a cutting-edge cybersecurity firm based in Virginia, has uncovered a Chinese hacking group known as StormBamboo, which is injecting malware into software updates distributed…
The United States Cybersecurity and Infrastructure Security Agency (CISA) has added a Microsoft vulnerability dating back to 2018 to its Known Exploited Vulnerabilities (KEV) catalogue…
A previously undocumented Android malware named ‘LightSpy’ has been discovered targeting Russian users, posing on phones as an Alipay app or a system service to…
Foreign diplomatic missions and non-governmental organisations (NGOs) in Ukraine are failing to adequately safeguard staffers from basic phishing attacks, putting government personnel and national security…
Cybersecurity experts have uncovered a series of attacks targeting organizations in Kazakhstan by a threat actor dubbed “Bloody Wolf.” The group utilizes STRRAT, an inexpensive…
Out of the world’s 2,000 largest companies, 1,980 have a direct connection to a technology supplier that has experienced a recent cyber security incident or…
Register today for mWISE™, the unique cybersecurity conference from Mandiant, now part of Google Cloud. Built by practitioners for practitioners, mWISE runs from September 18…
Aug 05, 2024Ravie LakshmananNetwork Security / Threat Intelligence Organizations in Kazakhstan are the target of a threat activity cluster dubbed Bloody Wolf that delivers a…
A threat actor has reportedly claimed responsibility for leaking a database belonging to SisaCloud, Thailand’s School Information System Advance. This alarming news was first reported…
Apple’s open-source “swift-homomorphic-encryption” package revolutionizes privacy in cloud computing. It allows computations on encrypted data without decryption, safeguarding user information. Used in iOS 18 Live…
05 Aug Cybersecurity Deep-Dive: 18 Types of Cyberattacks & Prevention Methods Posted at 08:53h in Blogs by Di Freeze This week in cybersecurity from the…