Infostealer malware logs used to identify child abuse website members
Thousands of pedophiles who download and share child sexual abuse material (CSAM) were identified through information-stealing malware logs leaked on...
Read more →Thousands of pedophiles who download and share child sexual abuse material (CSAM) were identified through information-stealing malware logs leaked on...
Read more →Microsoft’s planned Windows Recall feature remains vulnerable to cyberattacks in its latest version, according to a security researcher – even...
Read more →Twilio has confirmed that an unsecured API endpoint allowed threat actors to verify the phone numbers of millions of Authy...
Read more →Most accomplished cybercriminals go out of their way to separate their real names from their hacker handles. But among certain...
Read more →Ransomware has become a growing threat in our new hybrid world. It encrypts a victim’s files, rendering them inaccessible, and...
Read more →The United Nations Development Programme (UNDP) is pleased to announce a new partnership with the DFINITY Foundation, which will leverage...
Read more →In a disturbing evolution of ransomware tactics, a new group known as Volcano Demon has emerged, diverging from the usual...
Read more →HealthEquity Inc., the largest health savings account administrators in the U.S., has encountered a cybersecurity setback, as detailed in its...
Read more →FIA (Fédération Internationale de l’Automobile), the auto racing governing body since the 1950s, says attackers gained access to personal data...
Read more →Hackers are actively exploiting a remote code execution vulnerability in the HTTP File Server (HFS) program. The vulnerability, identified as...
Read more →ASUS and NordVPN partner for 1st routers with built-in VPN! Enhance your home network security & privacy with this innovative...
Read more →Europol coordinated a joint law enforcement action known as Operation Morpheus, which led to the takedown of almost 600 Cobalt...
Read more →