P2PInfect botnet activity surges 600x with stealthier malware variants
The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then...
Read more →The P2PInfect botnet worm is going through a period of highly elevated activity volumes starting in late August and then...
Read more →Today, T-Mobile customers said they could see other peoples’ account and billing information after logging into the company’s official mobile...
Read more →Credit reporting firm TransUnion has denied claims of a security breach after a threat actor known as USDoD leaked data...
Read more →The developers of Free Download Manager (FDM) have published a script to check if a Linux device was infected through...
Read more →The dreaded data breach is an outcome feared by companies of all sizes in today’s threat landscape, largely due to...
Read more →A hacker is spreading a fake proof-of-concept (PoC) exploit for a recently fixed WinRAR vulnerability on GitHub, attempting to infect...
Read more →Signal has announced that it upgraded its end-to-end communication protocol to use quantum-resistant encryption keys to protect users from future...
Read more →Scammers are impersonating the bankruptcy claim agent for crypto lender Celsius in phishing attacks that attempt to steal funds from...
Read more →Trend Micro fixed a remote code execution zero-day vulnerability in the Trend Micro’s Apex One endpoint protection solution that was actively exploited...
Read more →The International Criminal Court (ICC) disclosed a cyberattack on Tuesday after discovering last week that its systems had been breached....
Read more →GitLab has released security updates to address a critical severity vulnerability that allows attackers to run pipelines as other users...
Read more →Microsoft said today that the Exchange Web Services (EWS) API for Exchange Online and Office 365 will be retired in approximately...
Read more →