LockBit group falsely claimed the hack of the Federal Reserve

2 years ago

The LockBit ransomware group seems to have lied when they announced the hack of the US Federal Reserve. The real…

CISA adds GeoSolutionsGroup JAI-EXT, Linux Kernel, and Roundcube Webmail bugs to its Known Exploited Vulnerabilities catalog

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds GeoSolutionsGroup JAI-EXT, Linux Kernel, and Roundcube Webmail bugs to its Known Exploited…

New P2Pinfect version delivers miners and ransomware on Redis servers

2 years ago

Researchers warn that the P2Pinfect worm is targeting Redis servers with ransomware and cryptocurrency mining payloads. Cado Security researchers warned…

New MOVEit Transfer critical bug is actively exploited

2 years ago

Experts warn of active exploitation of a critical authentication bypass vulnerability in MOVEit Transfer file transfer software. Progress Software addressed…

New Caesar Cipher Skimmer targets popular CMS used by e-stores

2 years ago

A new e-skimmer called Caesar Cipher Skimmer is used to compromise multiple CMS, including WordPress, Magento, and OpenCart. Sucuri researchers…

Mirai-like botnet is exploiting recently disclosed Zyxel NAS flaw<gwmw style="display:none;"></gwmw>

2 years ago

Researchers warn that a Mirai-based botnet is exploiting a recently disclosed critical vulnerability in EoL Zyxel NAS devices. Researchers at…

Wikileaks founder Julian Assange is free<gwmw style="display: none; background-color: transparent;"></gwmw>

2 years ago

WikiLeaks founder Julian Assange has been released in the U.K. and has left the country after five years in Belmarsh…

CISA confirmed that its CSAT environment was breached in January.

2 years ago

CISA warned chemical facilities that its Chemical Security Assessment Tool (CSAT) environment was compromised in January. CISA warns chemical facilities…

Threat actors compromised 1,590 CoinStats crypto wallets

2 years ago

Threat actors breached 1,590 cryptocurrency wallets of the cryptocurrency portfolio management and tracking platform CoinStats. The cryptocurrency portfolio management and…

Experts observed approximately 120 malicious campaigns using the Rafel RAT<gwmw style="display:none;"></gwmw>

2 years ago

Multiple threat actors are using an open-source Android remote administration tool called Rafel RAT to target Android Devices. Check Point Research identified…

This website uses cookies.