Category: Bleeping Computer
The Abyss Locker operation is the latest to develop a Linux encryptor to target VMware’s ESXi virtual machines platform in…
Mr. Musk may have successfully pushed Twitter’s new name and logo, ‘X’, and even made the vanity domain x.com redirect to…
CISA says new malware known as Submarine was used to backdoor Barracuda ESG (Email Security Gateway) appliances by exploiting a…
With ransom payments declining, ransomware gangs are evolving their extortion tactics to utilize new methods to pressure victims. This was…
Starting this fall, Apple has announced that developers will be required to provide a reason for using certain APIs that…
Ivanti has fixed another vulnerability in the Endpoint Manager Mobile software (formerly MobileIron Core), exploited as a zero-day to breach the IT systems…
CISA warned today of the significant breach risks linked to insecure direct object reference (IDOR) vulnerabilities impacting web applications in…
Microsoft Edge web browser has been displaying security warnings after Twitter changed its name to ‘X’. Amid its rapid rebranding…
Two new Android malware families named ‘CherryBlos’ and ‘FakeTrade’ were discovered on Google Play, aiming to steal cryptocurrency credentials and…
The Hawaiʻi Community College has admitted that it paid a ransom to ransomware actors to prevent the leaking of stolen…
While consumers are usually the ones worried about their information being exposed in data breaches, it’s now the hacker’s turn,…
Estonian crypto-payments service provider CoinsPaid has announced that it experienced a cyber attack on July 22nd, 2023, that resulted in…