Crypto Miners
04
Jan
2024

3 Malicious PyPI Packages Found Targeting Linux with Crypto Miners

Jan 04, 2024NewsroomCryptocurrency Miner / Malware Three new malicious packages have been discovered in the Python Package Index (PyPI) open-source…

Orange Cyberattack Disrupts Internet Services In Spain
04
Jan
2024

Orange Cyberattack Disrupts Internet Services In Spain

The Spanish unit of telecoms provider Orange, the telecommunications behemoth, encountered disruptions in its internet services due to cyberattack. Users…

Maquisistema data leak
04
Jan
2024

Maquisistema Data Leak Exposes 2746 Lines On Dark Web

Peru-based financial organization Maquisistema has been allegedly impacted by a data breach. A threat actor going by the alias “God…

Over 11M SSH Servers are Vulnerable to new Terrapin Attack
04
Jan
2024

Over 11M SSH Servers are Vulnerable to new Terrapin Attack

Previously, in December 2023, it was reported that SSH servers were vulnerable to the new Terrapin Attack in which threat…

Wireshark 4.2.1 Released - What's New!
04
Jan
2024

Wireshark 4.2.1 Released: What’s New!

A free and open-source packet analyzer, Wireshark is used for network troubleshooting, education, software and communications protocol development, and analysis. …

How to protect mobile phone from malware attacks
04
Jan
2024

Over 1800 global banking apps targeted by 29 malware variants

In recent months, a staggering 29 malware families have been discovered targeting approximately 1800 banking applications worldwide. This revelation, based…

Researchers Hunted Malicious Stockpiled Domains DNS Records
04
Jan
2024

Researchers Hunted Malicious Stockpiled Domains DNS Records

Malicious stockpiled domains are the collection of domain names that threat actors acquire in advance for several types of future…

Active Directory Infiltration Methods Employed by Cybercriminals
04
Jan
2024

Active Directory Infiltration Methods Employed by Cybercriminals

Active Directory infiltration methods exploit vulnerabilities or weaknesses in Microsoft’s Active Directory to gain unauthorized access. Active Directory is a…

npm
04
Jan
2024

‘everything’ blocks devs from removing their own npm packages

Over the holidays, the npm package registry was flooded with more than 3,000 packages, including one called “everything,” and others named a…

Snatch Ransomware Group Claims The FDVA Cyber Attack
04
Jan
2024

Staff Data Exposed In Cyberattack On London Public Library

On Wednesday, the London Public Library stated that certain workers’ personal information was stolen by the hackers responsible for the…

Remcos RAT
04
Jan
2024

UAC-0050 Group Using New Phishing Tactics to Distribute Remcos RAT

Jan 04, 2024NewsroomSoftware Security / Malware The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT…

Wireshark 4.2.1 Released - What's New!
04
Jan
2024

Wireshark 4.2.1 Released – What’s New!

Wireshark is a popular open-source network protocol analyzer that allows users to inspect and capture data on a network in…