A new Linux version of TargetCompany ransomware targets VMware ESXi environments Pierluigi Paganini June 06, 2024 A new Linux variant…
In 2014, the National Institute of Standards and Technology (NIST), recognizing the importance of protecting U.S. systems and data against cyberattack, issued…
A new ransomware operation named ‘Fog’ launched in early May 2024, using compromised VPN credentials to breach the networks of…
Sophos uncovers “Operation Crimson Palace, a long-term cyberespionage effort targeting a Southeast Asian government. Learn how attackers used DLL sideloading…
Since its inception, the Execute with Excellence Award has had three remarkable recipients. Each one shares a unique perspective on…
The United States’ Federal Bureau of Investigation (FBI) has revealed it is in possession of thousands of LockBit ransomware decryption…
Chinese shopping platform Pandabuy told BleepingComputer it previously paid a a ransom demand to prevent stolen data from being leaked,…
Cybersecurity teams at Microsoft Threat Intelligence and Google’s Mandiant have jointly issued a stern warning regarding potential cyber threats facing…
Magnetic tape storage has a long history as a storage medium, being the primary way to store computer data from…
Researchers observed a Kiosk mode bypass vulnerability in a remote hotel’s check-in terminal during their stay there while traveling to…
By Milica D. Djekic The communication protocol is an information exchange method where data are transferred only if two or…
Jun 06, 2024NewsroomBotnet / DDoS Attack The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-patched…











