Ransomware gangs have recently joined ongoing attacks targeting a Microsoft SharePoint vulnerability chain, part of a broader exploitation campaign that has…
The largest cryptocurrency hack ever recorded involved the theft of 127,426 BTC from Chinese mining pool LuBian in December 2020. …
Digital Rights Management (DRM) systems are essential for safeguarding premium streaming content against unauthorized access and piracy, with Microsoft’s PlayReady…
A set of two security vulnerabilities has been found in a widely used line of Dahua security cameras, exposing devices…
Attackers wielding the Akira ransomware and possibly a zero-day exploit have been spotted targeting SonicWall firewalls since July 15, 2025….
Think you know what to expect from a conference booth? Think again. Forget the cliches: the swag destined for the…
A novel lateral movement technique that exploits BitLocker’s Component Object Model (COM) functionality to execute malicious code on target systems….
When Dave Yeager stumbled upon the chamber of shiny, casino-style slot machines, he felt an instant pull. It was his…
Cybersecurity researchers have uncovered significant overlaps between the attack infrastructure of ShadowSyndicate, also known as Infra Storm by Group-IB, and…
Newark, United States, August 4th, 2025, CyberNewsWire Early Bird registration is now available for the inaugural OpenSSL Conference, scheduled for…
Everyone’s an IT decision-maker now. The employees in your organization can install a plugin with just one click, and they…
Mozilla has warned browser extension developers of an active phishing campaign targeting accounts on its official AMO (addons.mozilla.org) repository. Mozilla’s…











