• View
Image

Elastic Stack API Security Vulnerability Exposes Customer and System Data

The mis-implementation of Elastic Stack, a collection of open-source products that employ APIs for crucial data aggregation, search, and analytics ca... Read more

Image

The expert assessed the prospects of cybersecurity company Group-IB after the arrest of its founder

Experts believe that the arrest of Ilya Sachkov, the founder and CEO of Group-IB, will not affect the company's work, nor will it affect the Russi... Read more

Image

Analysts Warn of Telegram Powered Bots Stealing Bank OTPs

In the past few years, two-factor verification is one of the simplest ways for users to safeguard their accounts. It has now become a major target fo... Read more

Image

Newly Discovered 'Tomiris’ Backdoor Linked to SolarWinds Attack Malware

Kaspersky security researchers have unearthed a new backdoor likely designed by the Nobelium advanced persistent threat (APT) behind last year's S... Read more

Image

Ransomware Attack On Major European Bookseller

Recently a ransomware attack targeted a leading book supplier software, the attack interrupted regular functions of thousands of bookstores in Europe... Read more

Image

RansomEXX Comes into Action Encrypting Files Using AES-CBC

In the latest Profero report - Senior Incident Responder Brenton Morris states that RansomeXX decryptors have failed to encrypt different files for t... Read more

Image

Turkish National Charged for DDoS Attack on U.S. Company

Authorities in the United States charged a Turkish national for launching distributed denial-of-service (DDoS) assaults against a Chicago-based multi... Read more

Image

GriftHorse Malware has Infected More than 10 Million Android Devices

A new malware named GriftHorse is said to have infected over 10 million Android cell phones. According to the research at mobile security firm Zimper... Read more

Image

Cybersecurity experts have discovered a new hacker group

Cybersecurity experts have discovered a new hacker group ChamelGang, which attacks institutions in ten countries around the world, including Russia.... Read more

Image

Scammers are Using Twitter Bots for PayPal and Venmo Scams

Internet scammers are using Twitter bots to trick users into making PayPal and Venmo payments to accounts under their possession. Venmo and PayPal ar... Read more

Image

Bandwidth Suffers Outages Caused by DDoS Attack

Within the last couple of days, Bandwidth.com has been the latest target of distributed denial of service attacks targeting VoIP companies.  Bandwidt... Read more

Image

Nobelium APT Group Uses Custom Backdoor to Target Windows Domains

Researchers from Microsoft Threat Intelligence Center (MSTIC) identified FoggyWeb, a new custom malware utilized by the Nobelium APT group to distrib... Read more

Image

Threat Actors from China Infiltrated a Major Afghan Telecom Provider

Just as the US was completing its withdrawal from Afghanistan, several China-linked cyberespionage groups were seen intensifying attacks on a major t... Read more

Image

Japan mentioned Russia in its new cybersecurity strategy

The Japanese government on Tuesday officially approved a new three-year cybersecurity strategy, where Russia, China and North Korea are mentioned for... Read more

Image

Kids Fairy Tale App Farfaria Exposed Data of 2.9 Million Users

Cybersecurity researcher at Comparitech has identified a misconfigured MongoDB database containing a treasure trove of data left uncovered to the pub... Read more

Image

Working Exploit Is Out for VMware vCenter CVE-2021-22005 Flaw

A fully working exploit for the remote code execution vulnerability in VMware vCenter labelled as CVE-2021-22005 is now publicly accessible, and is b... Read more

Image

Latest Microsoft Exchange Server Feature Mitigates High-Risk Bugs

One of the prominent targets for hackers is Microsoft Exchange, and the attack vector typically involves a popular vulnerability which the organizati... Read more

Image

Spoofed Zix Encrypted Email is Used in Credential Spear-Phishing

Hackers have used a credential phishing attack to steal data from Office 365, Google Workspace, and Microsoft Exchange by spoofing an encrypted mail... Read more

Image

Russia will develop a new cyber security standard

Positive Technologies is developing a new concept of cyber security standard. The document should become an open knowledge base, which will be exchan... Read more

Image

5 French Minister Phones Affected with Pegasus Spyware

At least five French ministers and President Emmanuel Macron's diplomatic advisor mobile phones have been infected by Israel-made Pegasus spyware,... Read more