LockBit Ransomware Gang in Decline, May Be Compromised, Report
LockBit’s leadership vanished for two weeks in August 2023. This suggests that the gang may have been compromised or that...
Read more →LockBit’s leadership vanished for two weeks in August 2023. This suggests that the gang may have been compromised or that...
Read more →New Malware Variant: Gigabud introduces a fresh wave of sophisticated cyber danger. Global Operation: Gigabud has targeted at least 25...
Read more →Massive Discord.io Data Breach Unveiled: Hacker “Akhirah” exposes a vast data breach on Discord.io, an unofficial service that provides redirect...
Read more →Fake Chrome Browser Update Scam: Trellix exposes a scheme using fake Chrome browser updates to sneak NetSupport Manager onto victim...
Read more →Background Task Weaknesses: macOS Ventura’s Background Task Management has vulnerabilities that allow hackers to evade detection and install malware. Researcher’s...
Read more →Stellar Cyber partners with Oracle Cloud to enhance cybersecurity capabilities. Stellar Cyber’s Open XDR platform now available on Oracle Cloud...
Read more →This article will explore the Ethereum Blockchain-based JasmyCoin market, its advantages, how to get started with JasmyCoin investment, the related...
Read more →Critical vulnerabilities unveiled in popular data center management platforms, posing serious security risks. CyberPower’s PowerPanel Enterprise and Dataprobe’s iBoot PDU...
Read more →Cybersecurity researchers uncover cyberattack targeting South African power-generating firm. Attackers deploy new variant of SystemBC malware, named DroxiDot, with CobaltStrike...
Read more →Thesnake02 hacker group exposes sensitive data from Brazilian Plastic Surgery Clinic. Breach occurred in July 2023, leaking 1.25 GB of...
Read more →Belarusian MoustachedBouncer hacking group exposed for state-sponsored espionage on foreign embassies. ESET Research reveals a years-long campaign targeting diplomats in...
Read more →Cybercriminals are adopting advanced phishing tactics, using legitimate services like Amazon Web Services (AWS) to launch convincing attacks that bypass...
Read more →