Knight Ransomware Attack Windows Computer to Exfiltrate Data
Knight ransomware, a relatively new ransomware gang that first appeared in August 2023, targets Windows computers to steal sensitive data. Several industrial sectors have been…
Knight ransomware, a relatively new ransomware gang that first appeared in August 2023, targets Windows computers to steal sensitive data. Several industrial sectors have been…
One of the top companies in the cybersecurity industry, Palo Alto Networks, has recently finalized the acquisition of Dig Security, an up-and-coming startup that specializes…
In today’s tech-driven world, our reliance on mobile devices is second nature. With apps powering our daily tasks, smooth app management across enterprise devices is…
The term “zero-day” indicates no time between developers discovering a vulnerability and attackers exploiting it. According to the Indusface zero-day vulnerability report, over 700 0-day…
Recent reports indicate that a new campaign under the name EleKtra-Leak has been identified to target AWS IAM (Identity and Access Management) credentials within minutes…
Cisco was reported with a critical vulnerability last week, which has been actively exploited by threat actors in the wild. The vulnerability was assigned with…
The Kopeechka service, which refers to “penny” in Russian, is a new tool criminals use to quickly and easily generate hundreds of fake social media…
Boeing, a major player in the aerospace industry, says it is “assessing” claims made by the LockBit ransomware group that it has taken a “tremendous amount”…
A massive data breach has occurred, resulting in the leak of personal information belonging to 815 million Indian citizens on the dark web. The compromised…
Hackers often use password-protected Zip Archive files for malware distribution to evade detection by security software. They let the malware infiltrate the target system without…
MSIX helps developers package Windows apps for easy installation. While it’s user-friendly, it demands access to code signing certificates, making it an attractive target for…
Three vulnerabilities have been discovered in NGINX ingress controllers, which were associated with arbitrary command execution, code injection, and sanitization bypass. The severity of these…