Inc Ransomware Claims 1.2TB Data Breach at Dollar Tree
The notorious INC Ransomware group is claiming responsibility for a data breach at Dollar Tree, the American retail chain known for selling most items at…
The notorious INC Ransomware group is claiming responsibility for a data breach at Dollar Tree, the American retail chain known for selling most items at…
In this article, we will provide a brief overview of Pillar Security’s platform to better understand how they are tackling AI security challenges. Pillar Security…
PyPI maintainers alert users to email verification phishing attack Pierluigi Paganini July 30, 2025 PyPI warns of phishing emails from noreply@pypj[.]org posing as “[PyPI] Email…
Once reserved for large enterprises, cybersecurity has become a top priority for businesses of all sizes. SMBs are driving surging demand for vCISO services to…
A critical vulnerability in SonicWall Gen7 firewall products could allow remote unauthenticated attackers to cause service disruptions through denial-of-service (DoS) attacks. The format string vulnerability…
A sophisticated zero-day exploit campaign targeting unpatched vulnerabilities in Microsoft SharePoint Server has compromised approximately 400 organizations worldwide, with potential for a far higher victim…
In Jul. 2021, Newsday visited Cybercrime Magazine’s HQ and studios and ran the headline “Live from Long Island: Northport radio station rolls out round-the-clock coverage…
Jul 30, 2025Ravie LakshmananFirmware Security / Vulnerability Cybersecurity researchers have disclosed now-patched critical security flaws in the firmware of Dahua smart cameras that, if left…
The UK Cyber Governance Code of Practice (CGCP), published in April by the Department for Science, Innovation and Technology, is the outcome of a collaborative…
A significant security vulnerability has been discovered in BeyondTrust’s Privilege Management for Windows solution, allowing local authenticated attackers to escalate their privileges to the administrator…
The Contagious Interview campaign conducted by the Lazarus Group continues to expand its capabilities. We have observed an exponential evolution in the delivery mechanisms for…
Jul 30, 2025Ravie LakshmananEndpoint Security / Cyber Espionage Chinese companies linked to the state-sponsored hacking group known as Silk Typhoon (aka Hafnium) have been identified…