Bug bounty platforms play a crucial role in the cybersecurity ecosystem by enabling organizations to leverage the expertise of external…
Fortunately for Radioactive Waste Management (RWM), the first-of-its-kind hacker attack on the project was unsuccessful. The United Kingdom’s Radioactive Waste…
Jan 02, 2024NewsroomData Privacy / Online Tracking Google has agreed to settle a lawsuit filed in June 2020 that alleged…
Terrapin attack allows to downgrade SSH protocol security Pierluigi Paganini January 02, 2024 Researchers discovered an SSH vulnerability, called Terrapin,…
Jan 02, 2024The Hacker NewsBrowser Security / Threat Protection Security stakeholders have come to realize that the prominent role the…
The notorious hacktivist group, Anonymous Sudan, is said to have orchestrated a Distributed Denial of Service (DDoS) attack on the…
The Rhysida ransomware group has allegedly claimed an Aspiration Training cyberattack on its dark web portal. Adding the award-winning specialist…
Multiple organizations in Iran were breached by a mysterious hacker Pierluigi Paganini January 02, 2024 Hudson Researchers reported that a…
Cyber attacks are evolving rapidly with advancements in technology, as threat actors exploit new vulnerabilities in:- The rise of the…
By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving…
In a recent development on an underground forum, a user is actively promoting the sale of Zeppelin2 ransomware, offering both…
The notorious CiphBit ransomware group has claimed another victim, with MPM Medical Supply falling prey to their cyber onslaught. The…










