May 30, 2024NewsroomVulnerability / Cryptocurrency The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security…
Internet Archive, one of the oldest online directories of websites, movies, books, software and more, is facing a cyberattack that…
An international law enforcement operation codenamed ‘Operation Endgame’ has seized over 100 servers worldwide used by multiple major malware loader…
May 30, 2024NewsroomWordPress / Website Security Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being…
1. Why VDP and Bug Bounty? At SIX Group, Alex Hagenah emphasized the year-round success of going beyond the regulatory…
The BBC has disclosed a data security incident that occurred on May 21, involving unauthorized access to files hosted on…
Hackers target and steal personal and financial data for fraud and other illicit purposes. They also sell the data on…
CryptoChameleon, a phishing tool detected in February 2024, was developed by someone anonymous and is used by threat actors to…
Pre-Boot Authentication Is the Missing Half By John Benkert, Cigent CEO and Co-founder In an era where data security breaches…
30 May Cybersecurity Cartoons As Wall Art Posted at 08:53h in Blogs by Di Freeze This week in cybersecurity from…
May 30, 2024NewsroomMalware / Cyber Crime Europol on Thursday said it shut down the infrastructure associated with several malware loader…
ANY.RUN sandbox has analyzed a new strain of Meterpreter backdoor malware that leverages sophisticated steganography techniques to conceal its malicious…











