Ukraine National Police have arrested a man they say helped disguise ransomware used by Russia-based threat groups. The 28-year-old cryptor…
A new phishing kit has been released that allows red teamers and cybercriminals to create progressive web Apps (PWAs) that…
A malware sandbox is a versatile solution that offers a variety of tools for studying malicious behavior, including threats’ network…
Safety and location services company Life360 says it was the target of an extortion attempt after a threat actor breached…
SSH and RDP provide remote access to server machines (Linux and Windows respectively) for administration. Both protocols are vulnerable to…
Thank you to Kane for coming up with the main thesis and as primary author of this piece. Check out…
The June 2024 Patch Tuesday update from Microsoft addressed almost 49 vulnerabilities in its products and 9 vulnerabilities in non-Microsoft…
A critical vulnerability (CVE-2024-37051) in the JetBrains GitHub plugin for IntelliJ-based IDEs (2023.1 and later) exposed access tokens to malicious…
Artic Wolfs Labs recently uncovered a novel ransomware variant dubbed FOG during their latest research on cyberattacks targeting organizations within…
At its annual re:Inforce conference, Amazon Web Services (AWS) has announced new and enhanced security features and tools. Additional multi-factor…
Following days of user pushback that included allegations of forcing a “spyware-like” Terms of Service (ToS) update into its products,…
(ROracle shares jumped nine percent as investors cheered a boom in demand for the company’s relatively low-cost cloud infrastructure services…











