Australian Gold Mining Company Reports Ransomware Attack
Evolution Mining Limited, a prominent global player in the gold mining industry, has reported a ransomware attack that impacted its...
Read more →Evolution Mining Limited, a prominent global player in the gold mining industry, has reported a ransomware attack that impacted its...
Read more →Hackers attack AWS as it hosts a vast number of high-value targets, including sensitive data, business applications, and cloud resources...
Read more →Head Mare, a hacktivist group targeting Russia and Belarus, leverages phishing campaigns distributing WinRAR archives to exploit CVE-2023-38831 for initial...
Read more →The UK’s National Cyber Security Centre (NCSC) recently hosted an unprecedented conference at its London headquarters, bringing together international government...
Read more →By reverse-engineering Quick Share’s proprietary communication protocol, researchers uncovered multiple vulnerabilities, including unauthorized file writes, forced Wi-Fi connections, directory traversal,...
Read more →U.S. authorities have arrested two believed administrators of the notorious WWH-Club, an online marketplace for stolen credit card information. The...
Read more →Such is the industry, that RISC-V, an open and extensible instruction set architecture (ISA) has now invaded the CPU market,...
Read more →The Cybersecurity and Infrastructure Security Agency (CISA) has raised alarms over malicious cyber actors’ active exploitation of the Cisco Smart...
Read more →Jenkins, an open source automation server, has been found to have two security issues, one of which is a critical...
Read more →A new APT group, dubbed Actor240524, launched a spear-phishing campaign targeting Azerbaijani and Israeli diplomats on July 1, 2024, where...
Read more →Mobile Device Management (MDM) is a device management solution for laptops, tablets, and smartphones used by organizations to enable them...
Read more →Kimsuky, a North Korean APT group, employs targeted phishing campaigns, leveraging DMARC exploitation to conceal social engineering, infiltrate university networks,...
Read more →