Tor needs 200 new WebTunnel bridges to fight censorship
The Tor Project has put out an urgent call to the privacy community asking volunteers to help deploy 200 new...
Read more →The Tor Project has put out an urgent call to the privacy community asking volunteers to help deploy 200 new...
Read more →APT-C-60 launched a phishing attack in August 2024, targeting domestic organizations with malicious emails disguised as job applications. These emails,...
Read more →Helldown Ransomware, a sophisticated cyber threat, actively targets critical industries worldwide by leveraging advanced cross-platform capabilities, including Windows and Linux,...
Read more →A cyberattack impacted operations at UK Wirral University Teaching Hospital Pierluigi Paganini November 28, 2024 UK’s Wirral University Teaching Hospital...
Read more →UNC2465, a financially motivated threat actor, leverages the SMOKEDHAM backdoor to gain initial access to target networks, which are often...
Read more →For the past two days, social media platforms have been abuzz with claims that Microsoft, the software giant, has been...
Read more →A researcher has discovered a data broker had stored 644,869 PDF files in a publicly accessible cloud storage container. The...
Read more →T-Mobile detected network intrusion attempts and blocked them Pierluigi Paganini November 28, 2024 T-Mobile reported recent infiltration attempts but pointed...
Read more →Protect Websites & APIs from Malware Attack Malware targeting customer-facing websites and API applications poses significant risks, including compliance violations,...
Read more →In today’s rapidly evolving threat landscape, security leaders must make informed decisions to protect their organizations effectively. The “MITRE Engenuity...
Read more →Ransomware groups and state-sponsored actors increasingly exploit data exfiltration to maximize extortion and intelligence gains by leveraging a mix of...
Read more →Summary Massive Data Leak: Propertyrec exposed over 644,000 records, totaling 713 GB of sensitive data. Sensitive Information: Leaked data includes...
Read more →