8Base Hackers Claim Skyroot Aerospace Ransomware Attack
The 8Base ransomware group has claimed yet another ransomware attack in India. The group has taken aim at the pioneering Indian privately held space launch…
The 8Base ransomware group has claimed yet another ransomware attack in India. The group has taken aim at the pioneering Indian privately held space launch…
In this Help Net Security interview, Patrice Auffret, CTO at Onyphe, explains how the traditional perimeter-based security view is becoming obsolete. He suggests that organizations…
Summary An attacker with a basic user forum account can specify a malicious avatar URL that discloses the contents of arbitrary local files on the…
Does anyone think the chances of surviving a plane crash increase if our tray tables are locked and our carry-on bags are completely stowed under…
Staying ahead in cybersecurity requires constant learning and adaptation. If you’re interested in cybersecurity research, explore the resources outlined below. DNSdumpster DNSdumpster is a free…
Flarum is a free, open source PHP-based forum software used for everything from gaming hobbyist sites to cryptocurrency discussion. A quick survey on Shodan suggests…
IT leaders are grappling with anxiety over the risks of generative AI despite continued confidence in their software-as-a-service (SaaS) security posture, according to Snow Software.…
Air traffic in the UK is recovering from a technology outage that caused widespread flight disruptions and cancellations overnight. The outage affected a system used…
Virgin Australia has released a baggage tracking tool for more than two-thirds of its domestic network. The airline’s new digital tool is the latest release…
Using an openly available API, cybercrimnals were able to scrape the data of 2.6 million DuoLingo users. An unknown party has released the scraped data…
Security researchers have published a proof-of-concept for vulnerabilities recently disclosed by Juniper Networks. The company said that while the vulnerabilities in its EX switches and…
In order to avoid being discovered, hackers used a novel technique that they named “MalDoc in PDF” to embed a malicious Word file inside of…