Hackers Stolen Over $58 Million Crypto Via Malicious Google Ads
Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been using Wallet Drainers for such…
Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been using Wallet Drainers for such…
In recent times, we’ve been inundated with countless stories about ransomware attacks and the extortion demands posed by cyber-criminals. However, a new facet of cyber-crime…
Which are the top storage array makers and what are their strategies towards the cloud, containers and consumption models of procurement? In this article, we…
Ransomware attackers exploit Windows zero-day vulnerabilities to gain elevated privileges. Zero-day vulnerabilities are undisclosed flaws that provide a direct way to bypass security measures. By…
Ubisoft, the renowned video game developer behind iconic franchises like Assassin’s Creed and Far Cry, narrowly escaped a potentially devastating data breach. On December 20th,…
By the beginning of 2023, the biggest storage supplier (Dell EMC) had seen growth in market share, while a giant of the past (IBM) had…
I recently hosted and moderated a distinguished panel of Chief Information Security Officers (CISOs) – Nitin Raina, CISO at ThoughtWorks, Mike Wilkes, former CISO at…
Barracuda fixed a new ESG zero-day exploited by Chinese group UNC4841 Pierluigi Paganini December 27, 2023 Security firm Barracuda addressed a new zero-day, affecting its…
GitHub, the omnipresent nexus for developers and their code, has embarked on a decisive initiative aimed at fortifying the security of the software supply chain. …
Hackers use weaponized Word documents to deliver malicious payloads through social engineering. By embedding malware or exploiting vulnerabilities in these documents, attackers trick users into…
When it comes to cyber crime, it’s easy to assume that there is nothing new under the sun. After all, the whole point of cyber…
The Snatch ransomware group has claimed the US President data leak, listing alleged Personally Identifiable Information (PII) and leaked data related to the Joe Biden,…