2024 Malware Trends – An Year With Highest Ever Recorded Cyber Threats
Last year witnessed an alarming escalation in cyber threats, with malware families evolving and attack tactics becoming more sophisticated than ever. According to a detailed…
Last year witnessed an alarming escalation in cyber threats, with malware families evolving and attack tactics becoming more sophisticated than ever. According to a detailed…
Clop Ransomware exploits Cleo File Transfer flaw: dozens of claims, disputed breaches Pierluigi Paganini January 16, 2025 The Clop ransomware gang claims dozens of victims…
Wolf Haldenstein Adler Freeman & Herz LLP (“Wolf Haldenstein”) reports it has suffered a data breach that exposed the personal information of nearly 3.5 million…
A newly disclosed vulnerability in Kubernetes, CVE-2024-9042, has raised concerns within the cloud-native community. This security flaw specifically affects Windows worker nodes and could allow…
The Federal Trade Commission (FTC) will require web hosting giant GoDaddy to implement basic security protections, such as multi-factor authentication and HTTPS APIs, to settle…
The Federal Trade Commission (FTC) has taken significant action against GoDaddy, one of the world’s largest web hosting companies, for failing to implement adequate security…
GoDaddy, a prominent web hosting service provider trusted by millions of customers to host their websites, has long been recognized as a digital enabler for…
The consequences of a wave of credit card skimmers—which is normal around the holidays—are starting to show. Label maker Avery has filed a data breach…
Jan 16, 2025Ravie LakshmananMalware / Ransomware Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger and 0bj3ctivity…
Although they have had two years to prepare for the incoming legislation, a study has today revealed that a significant minority of UK financial services…
A new UEFI Secure Boot bypass vulnerability tracked as CVE-2024-7344 that affects a Microsoft-signed application could be exploited to deploy bootkits even if Secure Boot protection…
Researchers from Top10VPN report to Cyber Security News that they have uncovered major vulnerabilities in tunneling protocols that allow attackers to hijack millions of internet…