Data leak at fintech giant Direct Trading Technologies Pierluigi Paganini January 31, 2024 Sensitive data and trading activity of over…
White Phoenix is a free ransomware recovery tool for situations where files are encrypted with intermittent encryption. It was tested…
Jan 31, 2024NewsroomCyber Attack / Network Security A pair of recently disclosed zero-day flaws in Ivanti Connect Secure (ICS) virtual…
The pro-Israeli hacktivist group, R00TK1T ISC Cyber Team, has allegedly targeted Malaysian entities, marking their first cyberattack on Aminia. The…
The NoName group claims to have launched a sophisticated cyberattack on multiple high-profile websites in the Netherlands. The targeted organizations…
It was previously reported that Jenkins was discovered with a new critical vulnerability, which was associated with unauthenticated arbitrary file…
In response to the surge in ransomware attacks over the last couple of years, the Australian government introduced legislation in…
In this Help Net Security interview, Stephanie Hagopian, VP of Security at CDW, discusses offensive strategies in the face of…
Jan 31, 2024NewsroomVulnerability / Endpoint Security Malicious local attackers can obtain full root access on Linux machines by taking advantage…
In an era dominated by digital connectivity, the importance of robust cybersecurity cannot be overstated. As organizations navigate the complex…
The newest version of the vulnerability scoring system CVSS 4.0 is here! After a lengthy gap between version 3 (released…
Ransomware attacks are increasing again as cybercriminals’ motivation shifts to data exfiltration, according to Delinea. The familiar tactics of crippling…











