Threat actors target Kubernetes installs via Argo Workflows to cryptocurrency miners, security researchers from Intezer warn. Researchers from Intezer uncovered…
XCSSET macOS malware continues to evolve, now it is able to steal login information from multiple apps, including Telegram and…
Estonian hacker Pavel Tsurkan has pleaded guilty in a United States court to the counts of computer fraud and of…
The software provider Kaseya announced to have obtained a universal decryptor for the REvil ransomware. Earlier this month, a massive…
Researchers from threat intelligence firm Group-IB helps Dutch police identify members of phishing developer gang known as Fraud Family. Group-IB,…
Check Point Research (CPR) experts have spotted a cheap malware, dubbed XLoader variant, which was upgraded to target both Windows and…
A US federal judge sentenced Russian hacker Peter Levashov to 33 months, time served, and three years of supervised release…
Microsoft has seized 17 malicious homoglyph domains used by crooks in a business email compromise (BEC) campaign targeting its users. Microsoft's Digital…
BleepingComputer became aware that the recent wave of attacks targeting vulnerable SonicWall devices was carried out by HelloKitty ransomware operators.…
The Joker malware is back, experts spotted multiple malicious apps on the official Google Play store that were able to…
This website uses cookies.