Breaking News

Threat actors target K-12 distance learning education, CISA and FBI warn

The US Cybersecurity Infrastructure and Security Agency and the FBI warned about the increase in ransomware attacks targeting the US…

5 years ago

Adrozek malware silently inject ads into search results in multiple browsers

Microsoft warns of a new malware named Adrozek that infects devices and hijacks Chrome, Edge, and Firefox browsers by changing…

5 years ago

Cisco addresses critical RCE vulnerability in Jabber

Cisco addressed a new critical RCE vulnerability that affects several versions of Cisco Jabber for Windows, macOS, and mobile platforms. Cisco…

5 years ago

Expert published PoC exploit code for Kerberos Bronze Bit attack

The proof-of-concept exploit code for the Kerberos Bronze Bit attack was published online, it allows intruders to bypass authentication and…

5 years ago

njRAT RAT operators leverage Pastebin C2 tunnels to avoid detection

Threat actors behind the njRAT Remote Access Trojan (RAT) are leveraging active Pastebin Command and Control Tunnels to avoid detection.…

5 years ago

Russia-linked APT28 uses COVID-19 lures to deliver Zebrocy malware

Russia-link cyberespionage APT28 leverages COVID-19 as phishing lures to deliver the Go version of their Zebrocy (or Zekapab) malware. Russia-linked APT28 is…

5 years ago

Attack on Vermont Medical Center is costing the hospital $1.5M a day

The attack that hit the University of Vermont Medical Center at the end of October is costing the hospital about $1.5 million…

5 years ago

European Medicines Agency targeted by cyber attack

The European Medicines Agency (EMA) announced it has been targeted by a cyber attack. The European Medicines Agency (EMA) announced…

5 years ago

Microsoft December 2020 Patch Tuesday fixes 58 bugs, 9 are critical

Microsoft December 2020 Patch Tuesday security update address 58 vulnerabilities, 22 of them are remote code execution vulnerabilities. Microsoft December…

5 years ago

The importance of computer identity in network communications: how to protect it and prevent its theft

The importance of computer identity in network communications: how to protect it and prevent threat actors from spying or stealing…

5 years ago

This website uses cookies.