A new Linux version of TargetCompany ransomware targets VMware ESXi environments
06
Jun
2024

A new Linux version of TargetCompany ransomware targets VMware ESXi environments

A new Linux version of TargetCompany ransomware targets VMware ESXi environments Pierluigi Paganini June 06, 2024 A new Linux variant…

Hackerone logo
06
Jun
2024

NIST CSF 2.0 and Pentesting: What You Need to Know

In 2014, the National Institute of Standards and Technology (NIST), recognizing the importance of protecting U.S. systems and data against cyberattack, issued…

Fog
06
Jun
2024

New Fog ransomware targets US education sector via breached VPNs

A new ransomware operation named ‘Fog’ launched in early May 2024, using compromised VPN credentials to breach the networks of…

Crimson Palace: Chinese Hackers Steal Military Secrets Over 2 Years
06
Jun
2024

Chinese Hackers Steal Military Secrets Over 2 Years

Sophos uncovers “Operation Crimson Palace, a long-term cyberespionage effort targeting a Southeast Asian government. Learn how attackers used DLL sideloading…

Hackerone logo
06
Jun
2024

HackerOne Company Values Matter: Execute with Excellence

Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one shares a unique perspective on…

FBI finds 7,000 LockBit decryption keys in blow to criminal gang
06
Jun
2024

FBI finds 7,000 LockBit decryption keys in blow to criminal gang

The United States’ Federal Bureau of Investigation (FBI) has revealed it is in possession of thousands of LockBit ransomware decryption…

Panda
06
Jun
2024

PandaBuy pays ransom to hacker only to get extorted again

Chinese shopping platform Pandabuy told BleepingComputer it previously paid a a ransom demand to prevent stolen data from being leaked,…

Naveen Goud
06
Jun
2024

Google n Microsoft confirm Cyber Threat to 2024 Paris Olympics

Cybersecurity teams at Microsoft Threat Intelligence and Google’s Mandiant have jointly issued a stern warning regarding potential cyber threats facing…

Storage technology explained: Key questions about tape storage
06
Jun
2024

Storage technology explained: Key questions about tape storage

Magnetic tape storage has a long history as a storage medium, being the primary way to store computer data from…

Researchers Accidentally Find Kiosk Mode Bypass In Hotel Check-In
06
Jun
2024

Researchers Accidentally Find Kiosk Mode Bypass In Hotel Check-In

Researchers observed a Kiosk mode bypass vulnerability in a remote hotel’s check-in terminal during their stay there while traveling to…

Cryptographic Protocol Challenges
06
Jun
2024

Cryptographic Protocol Challenges – Cyber Defense Magazine

By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or…

Muhstik Botnet
06
Jun
2024

Muhstik Botnet Exploiting Apache RocketMQ Flaw to Expand DDoS Attacks

Jun 06, 2024NewsroomBotnet / DDoS Attack The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched…