RansomHub Exploiting RDP Services To Exfiltrate Large Volumes Of Data
Ransomware-as-a-Service (RaaS) significantly lowers the technical barriers for threat actors to launch ransomware attacks, even it also enables threat actors...
Read more →Ransomware-as-a-Service (RaaS) significantly lowers the technical barriers for threat actors to launch ransomware attacks, even it also enables threat actors...
Read more →A sophisticated malware targeting organizations in the Middle East is posing a significant threat. Disguised as a legitimate Palo Alto...
Read more →Researchers observed a significant surge in phishing attacks targeting MS Office credentials via Microsoft Sway in July 2024, where attackers...
Read more →Cisco has disclosed a critical vulnerability in its NX-OS software that could allow unauthenticated, remote attackers to cause a denial...
Read more →A botnet is exploiting a new zero-day vulnerability, CVE-2024-7029, in AVTECH CCTV cameras to spread a Mirai variant, which is...
Read more →A critical vulnerability in the Dell Client Platform BIOS has been identified, potentially allowing hackers to hijack compromised systems. This...
Read more →Check Point® Software Technologies Ltd. (NASDAQ: CHKP), a prominent player in the cybersecurity industry, has announced a definitive agreement to...
Read more →The Wireshark Foundation has announced the release of Wireshark 4.4.0, bringing a host of new features, improvements, and bug fixes...
Read more →Artificial intelligence (AI) platforms have become integral tools for businesses and organizations worldwide. These technologies promise efficiency and innovation, from...
Read more →Security researchers have discovered that the BlackByte ransomware group is actively exploiting a recently patched authentication bypass vulnerability in VMware...
Read more →The U.S. Department of State has announced a reward of up to $2.5 million for information leading to Volodymyr Kadariya’s...
Read more →ESET researchers have uncovered two critical zero-day vulnerabilities in WPS Office for Windows, exploited by the advanced persistent threat (APT)...
Read more →