New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets
The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages AWS’s Server-Side...
Read more →The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages AWS’s Server-Side...
Read more →Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain, and metaverse...
Read more →A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account and replaced...
Read more →SUMMARY Indictment Filed: Three Russian nationals have been indicted for operating cryptocurrency mixers Blender.io and Sinbad.io, used to launder cybercrime...
Read more →SUMMARY Telefonica confirmed a data breach involving its internal Jira ticketing system, with stolen data leaked online. Hackers used compromised...
Read more →With the advent of virtual reality, everyone got scared that the life we know will disappear, and only those who...
Read more →SUMMARY Phishing Scam Targets Job Seekers: Cybercriminals impersonate CrowdStrike recruiters to distribute cryptominer malware via fake job offers. Malware Delivery:...
Read more →SUMMARY Fake PoC Exploit for CVE-2024-49113: A malicious exploit, “LDAPNightmare,” targets researchers by disguising it as a PoC for a...
Read more →SUMMARY Infoblox discovered widespread domain spoofing in spam campaigns while investigating ‘Muddling Meerkat.’ Collaboration with the cybersecurity community linked Muddling...
Read more →SUMMARY Critical Vulnerabilities Identified: Ivanti has disclosed two critical vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Connect Secure, Policy Secure, and ZTA...
Read more →SUMMARY Banshee Stealer targets macOS users, distributed via fake GitHub repositories and phishing sites. The malware steals browser credentials, cryptocurrency...
Read more →Discover how AI revolutionizes cybersecurity with real-time threat detection, adaptive protection, and advanced data protection to combat evolving cybersecurity risks....
Read more →