Researchers firm up ShinyHunters, Scattered Spider link
The ShinyHunters hacking collective responsible for a wave of cyber attacks orchestrated via Salesforce products is likely collaborating with the Scattered Spider gang that brought…
The ShinyHunters hacking collective responsible for a wave of cyber attacks orchestrated via Salesforce products is likely collaborating with the Scattered Spider gang that brought…
The U.S. Department of Justice (DoJ) seized cryptocurrency and digital assets worth $1,091,453 at the time of confiscation, on January 9, 2024, from the BlackSuit…
Imagine your Security Operations Center (SOC) as the tactical center of a medieval fortress, where vigilant sentries scan the horizon for approaching threats. But instead…
The threat actor known as ShinyHunters has publicly disclosed what they claim is a covert seizure of BreachForums, a notorious online platform used for trading…
The global financial impact from catastrophic cyber events that disrupt operational technology could near $330 billion on an annual basis, according to a report that…
Over 3,300 Citrix NetScaler devices remain unpatched against a critical vulnerability that allows attackers to bypass authentication by hijacking user sessions, nearly two months after…
Zoom has disclosed a critical vulnerability affecting multiple Windows-based clients, potentially allowing attackers to escalate privileges and compromise user systems. Designated as CVE-2025-49457 under bulletin…
Cybersecurity researchers at GreyNoise have detected an alarming surge in brute-force attacks against Fortinet SSL VPN systems, with over 780 unique IP addresses launching coordinated…
A new report from Bitdefender reveals the Russian-linked hacking group Curly COMrades is targeting Eastern Europe with a new backdoor called MucorAgent. Learn how they’re…
The next time you shake your head at another online scam and vow that you’d never fall for it, remember that even the most tech-savvy…
Listen to the article 3 min This audio is auto-generated. Please let us know if you have feedback. Hackers have breached critical infrastructure organizations in…
A new cyber-espionage threat group has been using a new backdoor malware that provides persistent access through a seemingly inactive scheduled task. The threat actor’s operations…