The Iranian state-sponsored threat actor MuddyWater has been observed exploiting a legitimate remote monitoring and management (RMM) tool, Atera Agent,…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
Facebook users need to be on high alert as a new phishing scam has emerged, disguising itself as a website…
Sweden’s liquor supply severely impacted by ransomware attack on logistics company Pierluigi Paganini April 26, 2024 A ransomware attack on…
Hackers often target WordPress plugins as they have security loopholes that they can exploit to hack into sites without permission. …
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…
In recent weeks, two high-profile cyber attacks have shaken industries across the globe, under-scoring the ever-present threat posed by malicious…
Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical security flaw in the…
In response to this growing threat, the Cybersecurity and Infrastructure Security Agency (CISA) has launched the Ransomware Vulnerability Warning Pilot…
SpaceX, the aerospace manufacturer and space transport services company founded by Elon Musk, has allegedly met with a cybersecurity incident,…
Progress addressed a critical vulnerability last week, which was associated with an unauthenticated Command injection on the Progress Flowmon product….
Palo Alto Networks has issued urgent remediation advice after discovering a critical vulnerability, designated CVE-2024-3400, which threat actors have exploited…











