Beginning on October 1st, 2024, WordPress will mandate two-factor authentication (2FA) for plugin and theme creators as a new security…
CosmicBeetle, a threat actor specializing in ransomware, has recently replaced its old ransomware, Scarab, with ScRansom, a custom-built ransomware that…
Cybercriminals are increasingly targeting retail affiliate programs with sophisticated cryptocurrency scams. Retailers and customers must stay alert against domain fraud,…
Sep 12, 2024Ravie LakshmananCryptocurrency / Network Security Internet-exposed Selenium Grid instances are being targeted by bad actors for illicit cryptocurrency…
Mastercard goes fishing and lands threat intelligence firm Recorded Future in its net for a record deal. Global payments network…
Banking malware is a type of malicious software that targets financial institutions and their customers. There is a rise in…
Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses…
Kransom ransomware hides within the StarRail game using DLL side-loading and a legitimate certificate from COGNOSPHERE PTE. LTD. Bypassing detection,…
12 Sep Backstory Of The DEF CON Voting Machine Hacking Village Posted at 08:54h in Blogs by Di Freeze This…
Sep 12, 2024Ravie LakshmananRegulatory Compliance / Data Protection The Irish Data Protection Commission (DPC) has announced that it has commenced…
Singapore Police arrest six men allegedly involved in a cybercrime syndicate Pierluigi Paganini September 12, 2024 The Singapore Police Force…
Once upon a time, I.T. security teams depended on hodgepodges of different cybersecurity solutions from various vendors. However, these multivendor…











