ALPHV Ransomware Deployment Started With RDP Access & ScreenConnect
Ransomware is used by hackers to abuse victims’ data, locking it until a ransom is paid. This method of cyber attack is profitable as it…
Ransomware is used by hackers to abuse victims’ data, locking it until a ransom is paid. This method of cyber attack is profitable as it…
Entrust launched Citizen Identity Orchestration solution. Governments now can streamline the delivery of public services through secure digital identities, embedding trust in every citizen interaction.…
A threat actor known as spr1ngtr4p has purportedly advertised a Remote Code Execution (RCE) vulnerability affecting a subdomain of Italy’s Ministry of Defence website. This…
Generative artificial intelligence (GenAI) is reshaping our world, from streamlining work tasks like coding to helping us plan summer vacations. As we increasingly adopt GenAI…
DuckDuckGo has unveiled a new feature, AI Chat, which offers users an anonymous way to access popular AI chatbots. This innovative service includes models like…
Sophos, a global leader in innovative security solutions designed to combat cyberattacks, has announced the appointment of Joe Levy as the company’s Chief Executive Officer…
A threat actor known as Desec0x has claimed to possess a database allegedly stolen from the State Grid Corporation of China (SGCC), offering it for…
A new XXE (XML eXternal Entity) Injection has been discovered to affect SharePoint on both on-prem and cloud instances. This vulnerability has been assigned to…
Frontier Communications Parent, Inc. (the “Company”) detected unauthorized access to portions of its information technology environment. The breach, attributed to a likely cybercrime group, exposed…
Researchers detected an attack involving a fake KMSPico activator tool, which delivered Vidar Stealer through several events. The attack leveraged Java dependencies and a malicious…
Every time a new version of the Windows operating system (OS) is released, the countdown clock starts ticking on the end-of-support date of its predecessor.…
Jun 10, 2024NewsroomCyber Espionage / Malware Cybersecurity researchers have disclosed details of a threat actor known as Sticky Werewolf that has been linked to cyber…