The 8220 Gang is exploiting multiple vulnerabilities, including the Oracle WebLogic Server vulnerability, to propagate cryptojacking malware in the Americas,…
John Hanley of IBM Security shares 4 key findings from the highly acclaimed annual Cost of a Data Breach Report…
Threat actors engage in cyberespionage to gain the following advantages:- Strategic Political Economic Military Hackers do so by stealing the…
The concept of DCAP solutions was introduced by Gartner experts, as it was clear, that without such solutions information security…
A new phishing campaign targeting Instagram users has been discovered, which uses several different techniques to lure victims into phishing…
In the dynamic realm of IT, HCL Technologies, the Noida-based juggernaut, recently found itself navigating choppy digital waters. The revelation…
Dec 21, 2023NewsroomDark Web / Cybercrime German law enforcement has announced the disruption of a dark web platform called Kingdom…
Google has released urgent upgrades to fix the Chrome zero-day high-severity vulnerability that has been widely exploited, which could lead…
Among the myriad of new ransomware groups on the dark web, a noteworthy addition has surfaced – the WereWolves ransomware…
On December 20, 2023, Rosvodokanal, the Russian water utility firm, experienced a alleged cyberattack perpetrated by the Ukrainian hacker group…
Data leak exposes users of car-sharing service Blink Mobility Pierluigi Paganini December 21, 2023 More than 22,000 users of Blink…
Dec 21, 2023NewsroomVulnerability / Phishing Attack Attackers are weaponizing an old Microsoft Office vulnerability as part of phishing campaigns to…











