An alliance of 40 countries will sign a pledge during the third annual International Counter-Ransomware Initiative summit in Washington, D.C.,…
The Deputy Chairman of Ukraine’s technical security and intelligence service will give the keynote address at this year’s IRISSCERT cybersecurity…
Samsung has unveiled a new security feature called ‘Auto Blocker’ as part of the One UI 6 update, offering enhanced…
Cisco was reported with a critical vulnerability last week, which has been actively exploited by threat actors in the wild….
Cybercriminals are resorting to unscrupulous tactics to deploy Bonanza malware by exploiting Google Search Ads. The hackers are taking advantage…
Aadhaar, the unique identification number issued to every Indian citizen, has recently made headlines for all the wrong reasons. There…
Oct 31, 2023NewsroomCyber War / Malware The threat actor known as Arid Viper (aka APT-C-23, Desert Falcon, or TAG-63) has…
A threat actor is harvesting identity and access management (IAM) credentials from public GitHub repositories within five minutes of exposure,…
WiHD leak exposes details of all torrent users Pierluigi Paganini October 31, 2023 World-in-HD (WiHD), a French private video torrent…
An actor that security researchers call Prolific Puma has been providing link shortening services to cybercriminals for at least four…
Today, Dragos Inc., cybersecurity for industrial controls systems (ICS)/operational technology (OT) environments specialists, have announced the expansion of its combined…
Exploitation of a recently patched critical vulnerability in F5’s BIG-IP product started less than five days after public disclosure and…