China-Linked Blackwood APT Deploys Advanced NSPX30 Backdoor in Cyberespionage
The Blackwood APT is using the NSPX30 backdoor in cyberespionage attacks against individuals and companies in China, Japan, and the UK. ESET researchers have discovered…
The Blackwood APT is using the NSPX30 backdoor in cyberespionage attacks against individuals and companies in China, Japan, and the UK. ESET researchers have discovered…
The company now claims that allowing third-party ink cartridges in its printers would expose them to viruses and malware. Hewlett-Packard (HP) claims to have laptops…
Powerloom, the composable data network, has just announced a partnership with Polygon Network. In a first-of-its-kind event on Polygon, Powerloom is set to launch a…
Pwn2Own Automotive 2024 takes place in Tokyo, Japan, from January 24 to 26. The Pwn2Own Automotive 2024 hacking contest, taking place in Tokyo, Japan from…
Check Point’s Live Cyber Threat Map identified 20,000 instances of QR code phishing and malware attacks within two weeks, highlighting the vulnerability of QR codes…
As per the data breach notification filed by the company with Maine’s attorney general office, hackers gained access to customers’ usernames and passwords, along with…
The report outlines that Artificial Intelligence (AI), currently utilized by cybercriminals, is lowering entry barriers for less experienced threat actors, including hackers-for-hire and hacktivists. In…
The staggering 198.3 gigabytes of misconfigured database contained more than 260,000 records including customer selfies with unredacted credit cards. Cybersecurity researcher Jeremiah Fowler recently uncovered…
The LockBit ransomware gang has given Subway a deadline of February 2, 2024, to pay the ransom, or their data will be leaked. International fast-food…
In today’s evolving trends, businesses are constantly searching for ways to streamline their operations and enhance efficiency. One area where this becomes particularly important is…
In today’s ever-evolving cyberspace, organizations face an ever-increasing number of cyber threats. Malicious actors are constantly seeking to exploit vulnerabilities to gain advantage or engage…
The cybersecurity researchers at Huntress have issued a warning about a recent surge in cyber attacks, highlighting a new strategy employed by cybercriminals who are…