Threat actors are already trying to exploit a critical authentication bypass flaw in Progress MOVEit Transfer, less than a day…
Polyfill.js is a JavaScript library that gives modern functionality on older browsers without native support for some web features. Polyfills…
A shockwave went through the financial world when ransomware group LockBit claimed to have breached the US Federal Reserve, the…
The June 2024 optional update for Windows 10 is now available. Today’s update brings KB5039299 for Windows 10 version 22H2 with up…
A new ELF malware tool named k4spreader, written in Cgo by the Chinese “8220” (Water Sigbin) mining gang, was discovered…
A novel Android attack vector from a piece of malware tracked as Snowblind is abusing a security feature to bypass…
Hackers abuse CHM files because they can embed malicious scripts or code within them. Windows systems often trust and execute…
Cybersecurity researchers have identified a new ransomware payload associated with the P2Pinfect malware, primarily targeting Redis servers. This sophisticated malware,…
Hacktivist group KillSec has revealed a new weapon in their digital arsenal: a Ransomware as a Service (RaaS) program designed…
Hackers attack AI infrastructure platforms since these systems contain a multitude of valuable data, algorithms that are sophisticated in nature,…
By Mike Fleck, Head of Product Marketing at DigiCert Digital trust is at the core of what makes internet connected…
26 Jun 2024 Cybersecurity Almanac: 100 Facts, Figures, Predictions And Statistics Posted at 08:52h in Blogs by Di Freeze This…











