Latest News
Venom RAT Spreads Through Fake WinRAR Vulnerability Exploit on GitHub
A malicious actor executed a rather unconventional strategy by releasing a counterfeit proof-of-concept (PoC) exploit for a newly unveiled WinRAR vulnerability on the popular code-sharing platform GitHub. The intent behind this peculiar maneuver was to compromise...
Venom RAT Spreads Through Fake WinRAR Vulnerability Exploit on GitHub
A malicious actor executed a rather unconventional strategy by releasing a counterfeit proof-of-concept (PoC) exploit for a newly unveiled WinRAR vulnerability on the popular code-sharing platform GitHub. The intent behind this peculiar maneuver was to compromise...
TransUnion Hacked by the Threat Actor ‘USDoD’
In a recent cybersecurity development, TransUnion, a prominent credit reporting agency, appears to be grappling with a potential data breach incident. A hacker, operating under the alias "USDoD," has allegedly compromised the personal information of 58,505 customers...
Featured Videos
Browse News
CyberSecurity
Ransomware
Phishing
Security Spotlight
Product Reviews
Cyber Security News
Vulnerabilities Discovered in Nagios XI Network Monitoring Software
A series of security vulnerabilities have come to light in Nagios XI, a widely used network monitoring software. These vulnerabilities, tracked from CVE-2023-40931 to CVE-2023-40934, have raised concerns regarding potential privilege escalation and information...
Venom RAT Spreads Through Fake WinRAR Vulnerability Exploit on GitHub
A malicious actor executed a rather unconventional strategy by releasing a counterfeit proof-of-concept (PoC) exploit for a newly unveiled WinRAR vulnerability on the popular code-sharing platform GitHub. The intent behind this peculiar maneuver was to compromise...
TransUnion Hacked by the Threat Actor ‘USDoD’
In a recent cybersecurity development, TransUnion, a prominent credit reporting agency, appears to be grappling with a potential data breach incident. A hacker, operating under the alias "USDoD," has allegedly compromised the personal information of 58,505 customers...
ALPHV Breaches Australian Law Firm Impacting 65 Government Organizations
In April, a ransomware incident targeted one of Australia's prominent law firms, HWL Ebsworth, causing a ripple effect across the nation's cybersecurity landscape. The breach, which exposed 1.45 gigabytes of the firm's data, was attributed to the Russian-speaking...
Rusty Flag Campaign Targets Azerbaijan with Rust-Based Malware
A series of targeted attacks centered in Azerbaijan has drawn the attention of experts. This campaign exhibits a distinct characteristic: the deployment of malware crafted in the Rust programming language. Referred to as "Operation Rusty Flag" by the cybersecurity...
ShroudedSnooper Targets Middle East Telecoms with HTTPSnoop Backdoor
In the Middle East, telecommunication service providers face a growing cybersecurity threat in the form of a new intrusion set known as ShroudedSnooper. This malicious campaign employs a stealthy backdoor called HTTPSnoop, designed to infiltrate target systems...
Ransomware News
ALPHV Breaches Australian Law Firm Impacting 65 Government Organizations
In April, a ransomware incident targeted one of Australia's prominent law firms, HWL Ebsworth, causing a ripple effect across the nation's cybersecurity landscape. The breach, which exposed 1.45 gigabytes of the firm's data, was attributed to the Russian-speaking...
Sphynx Encryptor Deployed in BlackCat Ransomware Attack on Azure Storage
The BlackCat (ALPHV) ransomware group has exhibited an evolved modus operandi, leveraging stolen Microsoft accounts and a recently discovered encryptor known as Sphynx to target Azure cloud storage. During a comprehensive investigation, cybersecurity experts from...
UNC3944 Threat Actor Shifts to Ransomware Attacks for Financial Gain
Cybersecurity experts have identified a shift in tactics by the financially motivated threat actor known as UNC3944. This group has expanded its monetization strategies, now incorporating ransomware deployment as part of its arsenal. Mandiant, a leading threat...
Exploring Man-in-the-Middle Attacks and How to Defend Against Them
In an era defined by digital connectivity, where online communication reigns supreme, the realm of cybersecurity threats has evolved into a landscape of unprecedented sophistication. Amidst this evolving threat landscape, the Man-in-the-Middle (MitM) attack emerges as...
Cybercriminals Exploit EV Certificates in Phishing Campaigns to Spread Ransomware
In recent developments, threat actors responsible for the RedLine and Vidar information stealers have exhibited a notable shift towards ransomware operations. This transition has been primarily facilitated through phishing campaigns, deploying initial payloads that...
This Week in Cybersecurity: Sep 11 – Sep 15
ALPHV Brings MGM Resorts to a Halt in Ten Minutes In a recent cyber incident that has shaken the operations of MGM Resorts, the ALPHV/BlackCat ransomware group has emerged as the main culprit. This unanticipated breach originated from an unusual source, LinkedIn,...
Security Spotlight
This Week in Cybersecurity: Sep 11 – Sep 15
ALPHV Brings MGM Resorts to a Halt in Ten Minutes In a recent cyber incident that has shaken the operations of MGM Resorts, the ALPHV/BlackCat ransomware group has emerged as the main culprit. This unanticipated breach originated from an unusual source, LinkedIn,...
This Week in Cybersecurity: Sep 04 – Sep 08
Critical Vulnerabilities Discovered in SEL’s Power Management Products In a recent disclosure, Schweitzer Engineering Laboratories (SEL) finds itself in the spotlight, as Nozomi Networks uncovers nine security vulnerabilities within their electric power management...
Unseen Threats: Demystifying Fileless Malware Attacks
In today's digital landscape, cybersecurity is a critical concern for organizations of all sizes. Malicious actors are constantly evolving their tactics to bypass traditional security measures. One such technique that has gained significant traction is deploying...
Behind Data Breach Costs: Evaluating Expenses and Preparedness
Data breaches have become a significant concern for organizations of all sizes and industries. Not only can data breaches result in financial losses, but they also lead to reputational damage and loss of customer trust. Understanding the factors that influence the...
This Week in CyberSecurity: August 14 – August 18
LABRAT Campaign Exploits GitLab Vulnerability for Cryptojacking and Proxyjacking A sophisticated campaign has come to light, showcasing the strategic utilization of a formerly vulnerable flaw within GitLab as a pivotal element in an intricate scheme involving both...
Cyberattack Exposes Data of Students from Colorado’s Public High Schools and Colleges
The Colorado Department of Higher Education has issued an alarming notice on Friday regarding a large-scale cybersecurity breach. This breach, believed to have occurred over a span of more than a decade leading up to 2020, has potentially exposed the personal...
Stay Up to Date With The Latest News & Updates
Join Our Newsletter
Follow Us