Hacking

A new sophisticated SkidMap variant targets unsecured Redis servers

A new campaign targets Redis servers, this time the malware employed in the attacks is a new variant of the…

3 years ago

The number of ransomware attacks targeting Finland increased fourfold since it started the process to join NATO

Senior official reports a quadruple increase in ransomware attacks against Finland since it started the process to join NATO. The…

3 years ago

Microsoft fixed a flaw in Power Platform after being criticized

Microsoft announced it has addressed a critical flaw in its Power Platform after it was criticized for the delay in fixing…

3 years ago

BlueCharlie changes attack infrastructure in response to reports on its activity

Russia-linked APT group BlueCharlie was observed changing its infrastructure in response to recent reports on its activity. Researchers from Recorded…

3 years ago

Reptile Rootkit employed in attacks against Linux systems in South Korea

Researchers observed threat actors that are using an open-source rootkit called Reptile in attacks aimed at systems in South Korea. Reptile is…

3 years ago

A cyberattack impacted operations of multiple hospitals in several US states

A cyberattack has disrupted the computer systems of multiple hospitals in several states, with a severe impact on their operations.…

3 years ago

Married couple pleaded guilty to laundering billions in cryptocurrency stolen from Bitfinex in 2016

A married couple from New York pleaded guilty this week to laundering billions of dollars stolen from Bitfinex in 2016.…

3 years ago

Malicious packages in the NPM designed for highly-targeted attacks

Researchers discovered a new set of malicious packages on the npm package manager that can exfiltrate sensitive developer data. On…

3 years ago

Attackers use dynamic code loading to bypass Google Play store’s malware detections

Threat actors rely on the 'versioning' technique to evade malware detections of malicious code uploaded to the Google Play Store.…

3 years ago

Decommissioned medical infusion pumps sold on secondary market could reveal Wi-Fi configuration settings

Experts warn that decommissioned medical infusion pumps sold via the secondary market could expose Wi-Fi configuration settings. The sale of…

3 years ago

This website uses cookies.