Category: CyberSecurityNews
Phishing campaigns are still the most effective way to hack a person, spread malware, infiltrate an organization or conduct any…
“It takes 20 years to build a reputation and a few minutes of cyber-incident to ruin it,” says Stephane Nappo,…
According to recent reports, there have been two serious vulnerabilities found in the Trellis SIEM. These vulnerabilities could potentially allow…
White snake stealer, an info stealer which has enhanced features now able to target both Windows and Linux platforms posing…
Recent reports have identified two significant vulnerabilities in Trellis SIEM, which may enable unauthorized parties to execute commands in the…
DNS flaws are very common on web applications where the DNS resolvers are vulnerable to Kaminsky attacks. If threat actors…
Recently, the cybersecurity researchers at ASEC (AhnLab Security Emergency Response Center) found that the operators of Crysis ransomware are actively…
Recently, it has been found by the security analysts at Deep Instinct that MuddyWater (aka Mango Sandstorm and Mercury), an…
In an attempt to reset the student’s passwords after a mistake in a cybersecurity audit, the Oak Park and River…
The DPRK campaign is utilizing a recently updated version of Rustbucket malware to avoid being detected. This variant of RUSTBUCKET,…
It has been observed that a new Proxyjacking campaign attack SSH servers and subsequently builds Docker services that share the victim’s…
It has come to light that the University of Manchester fell victim to a Ransomware Hack, which resulted in the…