Will Cybercrime Erupt With Baphomet Returning To Telegram?
After the arrest of the former admin of the BreachForums, Pompompurin, the succeeding administrator Baphomet has gotten into a game of peekaboo on the dark…
After the arrest of the former admin of the BreachForums, Pompompurin, the succeeding administrator Baphomet has gotten into a game of peekaboo on the dark…
A new group of hackers, which calls itself the ‘Indian Cyber Mafia’, has allegedly launched cyberattacks on Indonesian universities. This was in retaliation to hacking…
A hacker group known as ShadowHacker has claimed to have gained access to the database of freshersworld.com, a popular website for job seekers in India.…
Android users beware: a new Android botnet called DAAM is distributed through Trojanized applications. This was recently discovered by Cyble Research & Intelligence Labs (CRIL)…
Illinois State Court Network hacked! Everest ransomware group has reportedly gained full access to the network of the US District Court in Illinois and is…
Anonymous Sudan targeting the news media in the Middle East on the pretext of the news outlets spreading misinformation. The hacktivist group listed mazidnews.com, http://almashhad.com…
The recent security breach by the infamous hacking group, Medusa, has compromised the safety of major organizations. Bing Maps and Cortana source codes leaked by…
Online furniture rental company RentoMojo has suffered a data breach. The incident came to light after the company sent a mail to its users informing…
Royal ransomware group added Mainstream Engineering, a NASA and the US Department of Defence contractor, to its victim list. Mainstream Engineering is a US-based research…
A previously patched Cisco router vulnerability has been exploited by APT28 to conduct reconnaissance and deploy malware, a CISA advisory read. The Cybersecurity and Infrastructure…
Apart from the unpredictability of occurrences and the certainty of existence, what’s the connection between cyberattacks and weather conditions? That’s the theme Microsoft has adapted…
In a collaborative investigation, a team of security experts disrupted the operations of the RedLine Stealer. In a series of tweets, ESET Research elaborated how,…