Censys announced two new product tiers of its search tool, Censys Search Solo and Censys Search Teams. These additions are…
Dec 12, 2023NewsroomCyber Espionage / Malware The Russian nation-state threat actor known as APT28 has been observed making use of…
Miklos Daniel Brody, a cloud engineer, was sentenced to two years in prison and a restitution of $529,000 for wiping…
North Korea-backed group Lazarus has been spotted exploiting the Log4Shell vulnerability (CVE-2021-44228) and novel malware written in DLang (i.e., the…
Recently, it has been reported that Magecart Veteran ATMZOW has found 40 new domains of Google Tag Manager. As a…
Recruiters are being targeted via spear-phishing emails sent by cybercrooks impersonating job applicants, Proofpoint researchers are warning. “The tone and…
A new malicious campaign, Editbot Stealer, was discovered in which threat actors use WinRAR archive files with minimal detection to…
Toyota Financial Services (TFS) notifies customers after a data breach that exposed personal and sensitive financial information. In a limited…
As if password authentication’s coffin needed any more nails, researchers in the UK have discovered yet another way to hammer…
Dec 12, 2023The Hacker NewsCybersecurity / GenAI Security 2023 has seen its fair share of cyber attacks, however there’s one…
A new menace has emerged on the dark web— the Editbot stealer. Recently discovered by Cyble Research and Intelligence Labs…
SafeBreach researchers have discovered eight new process injection techniques that can be used to covertly execute malicious code on Windows…











