Alert! Hackers Running Thousands of Fake Webshops
A sprawling cybercrime network, “BogusBazaar,” has stolen credit card details from over 850,000 online shoppers, mainly in Western Europe and...
Read more →A sprawling cybercrime network, “BogusBazaar,” has stolen credit card details from over 850,000 online shoppers, mainly in Western Europe and...
Read more →In a significant cybersecurity development, researchers have uncovered critical vulnerabilities in F5’s Next Central Manager, which could potentially allow attackers...
Read more →Tappware, a prominent IT service provider, faced a breach when approximately 50GB of its database was leaked on a hacker...
Read more →The Polish computer emergency response team CERT.pl has issued a warning about an ongoing cyberattack campaign by the notorious APT28...
Read more →Ensuring adherence to GDPR, the ANY RUN sandbox service employs TLS 1.3 for data in transit and AES-256 for data...
Read more →Security Risk Advisors (SRA) announces the launch of their OT/XIoT Detection Selection Workshop, a complimentary offering designed to assist organizations...
Read more →Hackers are now using steganography techniques to distribute the notorious Remote Access Trojan (RAT) known as RemcosRAT. This method, which...
Read more →A critical vulnerability in CrushFTP, identified as CVE-2024-4040, has been actively exploited in the wild. It allows attackers to perform...
Read more →Hackers have been found exploiting Google search ads to distribute malware through MSI (Microsoft Installer) packages. This campaign, involving the...
Read more →Veeam Service Provider console has been discovered with two critical vulnerabilities that were associated with Remote Code Execution. A CVE...
Read more →A new critical vulnerability has been discovered in PDF.js, which could allow a threat actor to execute arbitrary code when...
Read more →Juniper Threat Labs has reported active exploitation attempts targeting vulnerabilities in Ivanti Pulse Secure VPN appliances. These vulnerabilities, identified as...
Read more →