332 Million Email Addresses Scraped from SOCRadar.io Dumped Online
A hacker known as USDoD claims to have scraped 332 million email addresses from SOCRadar.io, which were later dumped online...
Read more →A hacker known as USDoD claims to have scraped 332 million email addresses from SOCRadar.io, which were later dumped online...
Read more →Volexity, a cutting-edge cybersecurity firm based in Virginia, has uncovered a Chinese hacking group known as StormBamboo, which is injecting...
Read more →The United States Cybersecurity and Infrastructure Security Agency (CISA) has added a Microsoft vulnerability dating back to 2018 to its...
Read more →A previously undocumented Android malware named ‘LightSpy’ has been discovered targeting Russian users, posing on phones as an Alipay app...
Read more →Foreign diplomatic missions and non-governmental organisations (NGOs) in Ukraine are failing to adequately safeguard staffers from basic phishing attacks, putting...
Read more →Cybersecurity experts have uncovered a series of attacks targeting organizations in Kazakhstan by a threat actor dubbed “Bloody Wolf.” The...
Read more →Out of the world’s 2,000 largest companies, 1,980 have a direct connection to a technology supplier that has experienced a...
Read more →Register today for mWISE™, the unique cybersecurity conference from Mandiant, now part of Google Cloud. Built by practitioners for practitioners,...
Read more →CVE-2024-38856, an incorrect authorization vulnerability affecting all but the latest version of Apache OFBiz, may be exploited by remote, unauthenticated...
Read more →Aug 05, 2024Ravie LakshmananNetwork Security / Threat Intelligence Organizations in Kazakhstan are the target of a threat activity cluster dubbed...
Read more →A threat actor has reportedly claimed responsibility for leaking a database belonging to SisaCloud, Thailand’s School Information System Advance. This...
Read more →Apple’s open-source “swift-homomorphic-encryption” package revolutionizes privacy in cloud computing. It allows computations on encrypted data without decryption, safeguarding user information....
Read more →