Threat actors are using mathematical symbols on impersonated company logos to evade detection in phishing campaigns. Researchers from anti-phishing cybersecurity…
The FreakOut (aka Necro, N3Cr0m0rPh) Python botnet evolves, it now includes a recently published PoC exploit for Visual Tools DVR.…
Ukrainian police arrested a cybercriminal who controlled a botnet composed of 100,000 devices that was available for rent to launch…
American media conglomerate Cox Media Group (CMG) was hit by a ransomware attack that took down live TV and radio…
The Dutch government will not tolerate ransomware attacks that could threaten national security, it will use intelligence or military services…
Researchers detailed the activities of the FIN12 ransomware group that earned million of dollars over the past years. Researchers from…
Resecurity researchers dumped Gigabytes of data from Agent Tesla C2Cs, one of the most well-known cyberespionage tools suffers a data…
An unnamed ransomware gang used a custom Python script to target VMware ESXi and encrypt all the virtual machines hosted…
The dark web marketplace White House Market shuts down its operation, last week its operators announced that they were retiring.…
Pottawatomie County restored operations that were suspended after a ransomware attack hit its systems on September 17, 2021. Officials at…
This website uses cookies.