NoName ransomware gang deploying RansomHub malware in recent attacks
The NoName ransomware gang has been trying to build a reputation for more than three years targeting small and medium-sized businesses worldwide with its encryptors and…
The NoName ransomware gang has been trying to build a reputation for more than three years targeting small and medium-sized businesses worldwide with its encryptors and…
Earth Preta, also known as Mustang Panda, Bronze President, RedDelta, and Red Lich, is a sophisticated Chinese APT group that has been active since at…
The air-gap data protection method isolates local networks from the internet to mitigate cyber threats and protect sensitive data, which is commonly used by organizations…
Groundbreaking technology integrates Post-Quantum Cryptography and SSL security for the next generation of Face-based eID solutions and Face-protected Digital Public Key Infrastructure (DPKI) Seventh Sense,…
Open-source cybersecurity tools provide transparency and flexibility, allowing users to examine and customize the source code to fit specific security needs. These tools make cybersecurity…
Sep 10, 2024Ravie LakshmananCyber Attack / Malware The threat actor tracked as Mustang Panda has refined its malware arsenal to include new tools in order…
The Indian government is planning to train and prepare 5,000 cyber commandos over the next five years to deal with cybercrimes in India. This is…
A security vulnerability, identified as CVE-2024-7591, has been disclosed affecting all versions of LoadMaster and the LoadMaster Multi-Tenant (MT) hypervisor. The LoadMaster vulnerability is critical…
A CI/CD pipeline is a series of automated steps that helps software teams deliver code faster, safer, and more reliably. It coordinates all the processes…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent warning about three critical vulnerabilities currently being exploited in the wild. These vulnerabilities affect…
In this Help Net Security interview, Shane Cox, Director, Cyber Fusion Center at MorganFranklin Consulting, discusses the evolving methodologies and strategies in threat hunting and…
Unilever has extended its IT contract with Accenture to help it use generative artifical intelligence (GenAI) to drive efficiencies and improve business agility. The consumer…