• View
Image

Seven-Fold Surge in Dark Web Ads Providing Corporate Network Access

In the latest study, researchers at Positive Technologies have documented the evolution of hacker-placed ads on the Dark Web from 2020 to early 2021.... Read more

Image

Bot that helps hackers write code

The Copilot service developed by Microsoft and GitHub specialists, designed to simplify the work of programmers, can be used by hackers to create mal... Read more

Image

Wiper Malware Used in Attack Against Iranian Railway

The cyber-attack that crippled Iran's national railway system at the beginning of the month was caused by a disk-wiping malware strain called Mete... Read more

Image

Two Belarusian Arrested in Black Box ATM Attack

The Polish authorities have detained two individuals committing so-called ‘Black Box’ attacks, targeting ATMs, whereby criminal offenders attach elec... Read more

Image

Following a Ransomware Cyberattack, D-BOX Stated it is Gradually Restarting Operations

After a ransomware cyberattack on its internal information-technology systems, D-BOX Technologies Inc. says it is progressively resuming operations,... Read more

Image

Severe Shopify Flaw Exposed GitHub Access Token And Source Code Repositories

Computer science student Augusto Zanellato has earned a $50,000 payday following the discovery of a publicly available GitHub Personal Access Token (... Read more

Image

XAMPP Hosts are Employed to Distribute Agent Tesla

RiskIQ's research team has evaluated the familiar fingerprints campaign in dangerous infrastructure from famous malware families. Their examinatio... Read more

Image

Malicious Linux Shell Scripts Used to Evade Defenses

Attackers' evasive methods stretch back to the times when base64 and other popular encoding schemes were utilized.  New Linux shell script methods... Read more

Image

UBEL is the Android Malware Successor to Oscorp

As part of a fresh campaign that began in May 2021, an Android malware that was discovered misusing accessibility features in the device to steal use... Read more

Image

The Life Cycle of a Breached Database

Every time there is another data breach, we are asked to change our password at the breached entity. But the reality is that in most cases by the tim... Read more

Image

The Russian Federation submitted to the United Nations the world's first draft convention against cybercrime

The Prosecutor General's Office of the Russian Federation reported that Russia has submitted to the UN the world's first draft convention on c... Read more

Image

BlackMatter & Haron Targeting Firms with Revenue of $100 Million and More

Cybersecurity researchers from South Korean security firm S2W Labs have unearthed two new ransomware groups. A sample of the first group of malware... Read more

Image

Raven Hengelsport Data Breach Exposes 18GB of Customer Data

The cybersecurity researchers from Safety Detectives uncovered an insecure Microsoft Azure Blob storage server linked to the Raven Hengelsport retail... Read more

Image

Data of 100 Million JustDial Customers Left Unsecured for Over a Year

The Personally Identifiable Information (PII) of approximately 100 million users of local business listing site JustDial was at stake after an Applic... Read more

Image

Bugs in the Zimbra Server Could Lead to Unrestricted Email Access

Multiple security flaws have been uncovered in the Zimbra email collaboration software, which could be abused to compromise email accounts by sending... Read more

Image

Signal Patches Zero-Day Bug in its Android App

Signal has patched a critical flaw in its Android app that, in some circumstances, sent random unintended images to contacts without an obvious expla... Read more

Image

Cyberattacks Zero in Tokyo Olympics as Games Begin

Malicious malware and websites have targeted both event organizers and regular spectators as the Tokyo Olympics' opening ceremony approaches.  Acco... Read more

Image

Hackers Applying HTML Smuggling To Distribute Malware

Another latest spam E-mail operation, which abused a technique named "HTML smuggling" to circumvent E-mail security measures and transmit ma... Read more

Image

Fake Windows 11 Installers are Being Used to Spread Malware

Although Windows 11 isn't expected to be released until later this year, hackers have already begun attempting to use it to infect victims with ma... Read more

Zimbra flaw lets attackers access the mail servers

Researchers discovered a flaw in the open-source Zimbra code. As a result, an attacker would gain unrestricted access to all sent and received emails... Read more

Image

Mobile County Officials Informs County Employees of Data Breach

The officials of Mobile County in southwest Alabama, have finally notified county employees of a computer system breach that compromised employee dat... Read more

Image

3.8 Billion Phone Numbers of Clubhouse Users up for Sale on Dark Web

On a hacking forum, a threat actor has begun selling the confidential database of Clubhouse, which contains 3.8 billion phone numbers. According to t... Read more