Hackers Registered 1,000+ New Malicious Domains Targeting US Elections
Cybersecurity researchers have uncovered over 1,000 newly registered malicious domains designed to exploit public interest in the upcoming vote. This...
Read more →Cybersecurity researchers have uncovered over 1,000 newly registered malicious domains designed to exploit public interest in the upcoming vote. This...
Read more →Phishing attacks are deceptive schemes where attackers impersonate reputable entities to trick individuals into revealing “sensitive information.” These attacks often...
Read more →Akira Ransomware Actors are Developing a Rust Variant to Attack ESXi servers. First identified in March 2023, it targets both...
Read more →A critical vulnerability has been identified in the OneDev DevOps platform, posing significant security risks to organizations relying on this...
Read more →Cybercriminals are increasingly targeting exposed Docker Remote API servers to deploy the perfctl malware, posing significant threats to organizations relying...
Read more →CISA has recently added a critical security vulnerability affecting ScienceLogic SL1 to its Known Exploited Vulnerabilities (KEV) catalog following reports...
Read more →Broadcom has released critical security updates to address severe vulnerabilities in VMware vCenter Server that could allow attackers to execute...
Read more →A critical elevation of privilege (EoP) vulnerability, identified as CVE-2024-43532, has been discovered in the Windows Remote Registry client. This...
Read more →Transak, a leading crypto payment services provider, has been affected by a significant data breach that affected over 92,000 users....
Read more →Kaspersky has reported that nearly 10 million personal and corporate devices were compromised by data-stealing malware in 2023, marking a...
Read more →In a significant move that is set to reshape the cybersecurity landscape, Sophos has announced its acquisition of SecureWorks for...
Read more →Ransomware groups are cybercriminal organizations that deploy malware to encrypt victims’ data, which helps render it inaccessible until a “ransom”...
Read more →