Threat Actor Allegedly Claim Breach of Dell Employee Data
A hacking forum post has raised concerns over a potential Dell Technologies data breach. The breach allegedly affects 10,800 employees and partners and exposes sensitive…
A hacking forum post has raised concerns over a potential Dell Technologies data breach. The breach allegedly affects 10,800 employees and partners and exposes sensitive…
India’s largest health insurance provider, Star Health, and Allied Insurance, recently experienced a significant data breach, resulting in the exposure of sensitive personal information belonging…
The Cybersecurity and Infrastructure Security Agency (CISA) has issued six new advisories concerning industrial control systems (ICS) on September 19, 2024. These advisories highlight critical…
GitLab, the popular DevOps platform, has issued a critical security advisory urging organizations to immediately patch their self-managed GitLab instances to address a severe authentication…
A remote access trojan (RAT), HZ RAT, that has been attacking Windows-based devices since at least 2020, was recently upgraded and changed to target Mac…
Google has unveiled a new feature in its Password Manager that allows users to sync passkeys across multiple devices. This update promises enhanced security and…
Mandiant exposed the activities of UNC1860, a sophisticated Iranian state-sponsored cyber group. This group, believed to be affiliated with Iran’s Ministry of Intelligence and Security…
Operation Kaerb resulted in the arrest of 17 cybercriminals in Argentina, Chile, Colombia, Ecuador, Peru, and Spain. This international operation is coordinated by Europol, Group-IB,…
A notorious hacking group known as TeamTNT has resurfaced with a new campaign targeting Virtual Private Server (VPS) infrastructures running on the CentOS operating system.…
Ivanti has warned about a critical vulnerability in its Cloud Services Appliance (CSA) 4.6, which has been actively exploited in attacks. The vulnerability, identified as…
Vanilla Tempest is a ransomware group that has recently targeted U.S. healthcare organizations using a new ransomware strain. This group has been active since at…
A C2 framework is an architecture that controls and maintains access to compromised systems. Its purpose is to allow you to run commands on other…