China Conceling State, Corporate & Academic Assets For Offensive Attacks
China’s cyber threat landscape has evolved into a complex ecosystem involving state actors, private companies, and academic institutions. This intricate...
Read more →China’s cyber threat landscape has evolved into a complex ecosystem involving state actors, private companies, and academic institutions. This intricate...
Read more →In a major crackdown on illegal streaming, law enforcement authorities across Europe, supported by Europol and Eurojust, have successfully dismantled...
Read more →Cybersecurity researchers have uncovered the first-ever UEFI bootkit designed to target Linux systems. This discovery, named ‘Bootkitty’, marks a new...
Read more →Microsoft has re-released the November 2024 Security Updates (SUs) for Exchange Server, addressing a critical issue that caused transport rules...
Read more →Cybersecurity researchers have uncovered a widespread Distributed Denial-of-Service (DDoS) campaign attributed to a threat actor using the alias “Matrix.” This...
Read more →A critical vulnerability has been discovered in Kemp’s LoadMaster Load Balancer, allowing for full system compromise through a command injection...
Read more →Nearly five years ago, Elon Musk, the visionary entrepreneur behind Twitter and a self-proclaimed interim President of the United States...
Read more →Attackers leveraging virtual private network (VPN) vulnerabilities and weak passwords for initial access contributed to nearly 30% of ransomware attacks,...
Read more →Nov 28, 2024Ravie LakshmananNetwork Security / Cyber Espionage U.S. telecom service provider T-Mobile said it recently detected attempts made by...
Read more →The crypto sector stands out as the only surveyed industry where deepfake fraud surpasses traditional document fraud in prevalence, according...
Read more →Despite the efforts of law enforcement agencies to stop and bring to justice those responsible for ransomware attacks, the situation...
Read more →A critical security flaw in Windows 11 has been discovered, allowing attackers to gain elevated system privileges through an integer...
Read more →