Matrix, A Single Actor Orchestrate Global DDOS Attack Campaign
Cybersecurity researchers have uncovered a widespread Distributed Denial-of-Service (DDoS) campaign attributed to a threat actor using the alias “Matrix.” This...
Read more →Cybersecurity researchers have uncovered a widespread Distributed Denial-of-Service (DDoS) campaign attributed to a threat actor using the alias “Matrix.” This...
Read more →Earth Estries, a Chinese APT group, has been actively targeting critical sectors like telecommunications and government entities since 2023. They...
Read more →The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced techniques, whereas recent variants focus...
Read more →Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims to fake login pages hosted...
Read more →A critical security vulnerability has been discovered in the popular WordPress plugin Anti-Spam by CleanTalk, which is installed on over 200,000...
Read more →Several high-severity vulnerabilities have been identified in Android and Google Pixel devices, exposing millions of users to potential security risks....
Read more →SpyLoan apps, a type of PUP, are rapidly increasing, exploiting social engineering to deceive users into granting excessive permissions, where...
Read more →CyberVolk, a politically motivated hacktivist group, has leveraged readily available ransomware builders like AzzaSec, Diamond, LockBit, and Chaos to launch...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) recently detailed findings from a Red Team Assessment (RTA) conducted on a critical...
Read more →A ransomware attack on Blue Yonder, a leading supply chain management software provider, has created ripples across global retail and...
Read more →Dell Technologies has released a security update for its Wyse Management Suite (WMS) to address multiple vulnerabilities that could allow...
Read more →IBM has issued a security bulletin warning customers about a vulnerability in its Workload Scheduler software that allows user credentials...
Read more →