Top vulnerability analysis
Ransomware and Cybercrime
Tor remains safe despite law enforcement infiltration
In response to recent reports alleging that German law enforcement agencies have breached the Tor network to identify...
Ghostly cybercrime lair exposed: admin faces charges
In a groundbreaking triumph for law enforcement, the sophisticated encrypted communication platform Ghost has been dismantled in a...
Medusa ransomware exploits critical Fortinet vulnerability
The notorious Medusa ransomware group has once again demonstrated its advanced capabilities by exploiting a critical SQL injection...
Port of Seattle hit by Rhysida ransomware attack
In a concerning development, the Port of Seattle has disclosed a cyberattack attributed to the notorious Rhysida ransomware...
Teenage suspect arrested in major cyberattack on London Transport
In a significant development, the National Crime Agency (NCA) has arrested a 17-year-old teenager from Walsall in connection...
Kawasaki Europe hit by cyberattack, RansomHub group demands ransom
Kawasaki Motors Europe (KME) has confirmed a cyberattack in early September that resulted in disruptions to its operations....
Protecting critical data with Google Cloud’s Air-Gapped backup vaults
In a bid to combat the growing threat of ransomware and data manipulation, Google Cloud has introduced air-gapped...
Lazarus’s Shadow: identifying six north korean threat groups
Lazarus Group, a notorious Advanced Persistent Threat (APT) group, has been linked to the North Korean government and...
Malware/phishing/spyware/databreach
You may also like
Phishing evolved: how fake CAPTCHAs are tricking users
A recent article highlights a sophisticated phishing attack discovered by ANY.RUN, a malware analysis platform. This attack employs...
Apache Tomcat vulnerability (CVE-2024-38286)
A severe vulnerability has emerged in Apache Tomcat, a widely used Java application server. Identified as CVE-2024-38286, this...
Unmasking north korean IT workers targeting global tech sectors
In today’s digital landscape, organizations face an escalating threat from cybersecurity attacks, leading to severe financial and reputational...
Beware of sophisticated phishing attacks targeting hotel Bookings
Phishing attacks are a common form of cybercrime that involves attackers impersonating legitimate entities to trick victims into...
Unveiling UNC1860: Iran’s stealthy cyber threat
In the ever-evolving cybersecurity landscape, state-sponsored threat actors continue to pose significant risks to organizations worldwide. Among them...
TeamTNT resurfaces: cybersecurity experts warn of new cloud server attacks
The notorious hacking group TeamTNT has returned with a new campaign targeting Virtual Private Server (VPS) infrastructures running...
Raptor Train Botnet hacked 200,000+ devices worldwide
A botnet is a formidable network of compromised devices controlled by a central entity known as a bot...
Tor remains safe despite law enforcement infiltration
In response to recent reports alleging that German law enforcement agencies have breached the Tor network to identify...
Russia’s Dr.Web disconnects servers to mitigate attack
In a recent cyberattack, the Russian cybersecurity firm Dr.Web (Dr.Web) was compelled to take immediate action to protect...
Discord unveils End-to-End encryption for enhanced voice and video privacy
Discord, the popular voice and chat platform, has recently announced the rollout of end-to-end encryption (E2EE) for audio...
ServiceNow instances expose sensitive corporate data
A recent study by AppOmni has uncovered a critical vulnerability in over 1,000 enterprise ServiceNow instances, resulting in...
SpyCloud reveals infostealer epidemic, emphasizing the urgency of enhanced cybersecurity
Recent research by SpyCloud, a leading provider of Cybercrime Analytics, has uncovered an alarming trend: infostealers, a type...