SentinelOne, the leading AI-powered security company, has made a significant move in the cloud security landscape by acquiring PingSafe, a…
Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its…
The attacker utilized the compromised Mandiant account to promote a cryptocurrency scam by posing as the Phantom crypto wallet and…
Jan 04, 2024NewsroomCryptocurrency Miner / Malware Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source…
The Spanish unit of telecoms provider Orange, the telecommunications behemoth, encountered disruptions in its internet services due to cyberattack. Users…
Peru-based financial organization Maquisistema has been allegedly impacted by a data breach. A threat actor going by the alias “God…
Previously, in December 2023, it was reported that SSH servers were vulnerable to the new Terrapin Attack in which threat…
A free and open-source packet analyzer, Wireshark is used for network troubleshooting, education, software and communications protocol development, and analysis. …
In recent months, a staggering 29 malware families have been discovered targeting approximately 1800 banking applications worldwide. This revelation, based…
Malicious stockpiled domains are the collection of domain names that threat actors acquire in advance for several types of future…
Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a…
Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called “everything,” and others named a…











