Lumma Stealer, also known as LummaC2, is a widely known malware that first surfaced in 2022. Since then, it has…
For the first time in the history of the tech industry, the U.S. Department of Justice (DOJ) has publicly acknowledged…
“Guilty until proven innocent,” writes Maxwell Alles in a Forbes article this week. That’s the way he likes to think of one…
FileSender is an open-source web application designed for securely transferring large files. The idea for FileSender was born in 2007…
The BianLian ransomware group has claimed the cyberattack on Boston Children’s Health Physicians (BCHP) and threatens to leak stolen files…
A simple BBQ lighter has been used to exploit vulnerabilities in laptops, gaining root access through an innovative method known…
Protect yourself from the ClickFix attack! Learn how cybercriminals are using fake Google Meet pages to trick users into downloading…
There are central processing units (CPUs), graphics processing units (GPUs) and even data processing units (DPUs) – all of which…
Insurance giant Globe Life says an unknown threat actor attempted to extort money in exchange for not publishing data stolen…
Security researchers at Palo Alto Networks’ Unit 42 have uncovered significant vulnerabilities in macOS’s Gatekeeper security mechanism. This discovery reveals…
The U.S. government on Wednesday announced the arrest and charging of two Sudanese brothers accused of running Anonymous Sudan (a.k.a….
Oct 17, 2024Ravie LakshmananRansomware / Network Security Cybersecurity researchers have gleaned additional insights into a nascent ransomware-as-a-service (RaaS) called Cicada3301…











