Threat actors breached the servers of US Census Bureau on January 11, 2020, exploiting an unpatched Citrix ADC zero-day vulnerability,…
North Korea-linked InkySquid group leverages two Internet Explorer exploits to deliver a custom implant in attacks aimed at a South…
FireEye Mandiant researchers have discovered a critical vulnerability in the Kalay cloud platform that exposes millions of IoT devices to…
A security researcher discovered that a secret FBI’s terrorist watchlist was accidentally exposed on the internet for three weeks between…
The recent attacks that targeted Iran's transport ministry and national train system were conducted by a threat actor dubbed Indra. In…
The US FINRA warns US brokerage firms and brokers of an ongoing phishing campaign impersonating its representatives to steal sensitive info. The…
T-Mobile is investigating a possible data breach after a threat actor published a post on a forum claiming to be…
The Glowworm attack leverages optical emanations from a device's power indicator LED to recover sounds from connected peripherals and spy…
Emails allegedly stolen from the Lithuanian Ministry of Foreign Affairs are available for sale in a cybercrime forum, some emails…
A security expert devised a method to retrieve a user's Microsoft Azure credentials in plaintext from Microsoft's new Windows 365…
This website uses cookies.