Blue Yonder Attack Attributed To New Termite Ransomware
Last month’s attack on supply chain management platform Blue Yonder has been attributed to a new ransomware group known as “Termite.” The ransomware attack hit…
Last month’s attack on supply chain management platform Blue Yonder has been attributed to a new ransomware group known as “Termite.” The ransomware attack hit…
A new report from the European Union Agency for Cybersecurity (ENISA) offers critical insights into the state of European Union cybersecurity, including recommendations to reinforce…
In a recent analysis by Cyble Research and Intelligence Labs (CRIL), a multi-stage cyberattack campaign has been identified, targeting the manufacturing industry. The attack, which…
Pro tip for hackers: Don’t threaten people whose specialty is uncovering the identity of cybercriminals. That mistake apparently led to the October arrest of Alexander…
The FBI has issued a new warning about the increasing use of artificial intelligence (AI) in online fraud schemes, which are becoming more advanced and…
Black Friday is the best, right? Well, sometimes. Deals everywhere, and chaos too. I’ve had moments feeling so lost in the sea of discounts it…
Clipper, a decentralized exchange (DEX), became the target of a cyberattack that led to a loss of approximately $450,000 from its protocol. While initially, rumors…
Zyxel Firewalls have become a key target in recent cyberattacks, with attackers exploiting a critical vulnerability to deploy the dangerous Helldown ransomware. The German CERT…
Oracle’s Agile Product Lifecycle Management (PLM) software has been flagged for a security vulnerability (CVE-2024-21287) by CERT-In (Computer Emergency Response Team – India). The vulnerability, cataloged…
Breaches of major U.S. telecom networks by the China-linked Salt Typhoon group have received widespread media attention, but a second threat actor has also been…
An unprecedented crackdown on cybercrime across Africa has resulted in the arrest of 1,006 suspects and the dismantling of 134,089 malicious infrastructures. Dubbed Operation Serengeti,…
The Ursnif banking Trojan, one of the most notorious forms of malware targeting financial data, has been observed in a sophisticated campaign using advanced techniques…