The source code of Zeppelin Ransomware sold on a hacking forum

2 years ago

A threat actor announced the sale of the source code and a cracked version of the Zeppelin ransomware builder for $500.…

Russia-linked APT Sandworm was inside Ukraine telecoms giant Kyivstar for months

2 years ago

Ukrainian authorities revealed that Russia-linked APT Sandworm had been inside telecom giant Kyivstar at least since May 2023. Russia-linked APT group…

Ivanti fixed a critical EPM flaw that can result in remote code execution

2 years ago

Ivanti fixed a critical vulnerability in its Endpoint Manager (EPM) solution that could lead to remote code execution (RCE) on…

MyEstatePoint Property Search Android app leaks user passwords

2 years ago

The MyEstatePoint Property Search app leaked data on nearly half a million of its users, exposing their names and plain-text…

Hacker hijacked Orange Spain RIPE account causing internet outage to company customers

2 years ago

An internet outage impacted Orange Spain after a hacker gained access to the company's RIPE account to misconfigure BGP routing.…

HealthEC data breach impacted more than 4.5 Million people

2 years ago

Healthcare technology company HealthEC disclosed a data breach that exposed the personal information of 4.5 million Individuals. Healthcare technology company…

Experts found 3 malicious packages hiding crypto miners in PyPi repository

2 years ago

Researchers discovered three malicious packages in the PyPI repository targeting Linux systems with a cryptocurrency miner. Fortinet researchers discovered three…

Crooks hacked Mandiant X account to push cryptocurrency scam

2 years ago

The X account of cybersecurity giant Mandiant was hacked, attackers used it to impersonate the Phantom crypto wallet and push…

Cybercriminals Implemented Artificial Intelligence (AI) for Invoice Fraud

2 years ago

Crooks created a new tool that uses Artificial Intelligence (AI) for creating fraudulent invoices used for wire fraud and BEC.…

CISA ADDS CHROME AND PERL LIBRARY FLAWS TO ITS KNOWN EXPLOITED VULNERABILITIES CATALOG

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Google Chrome and Perl library flaws to its Known Exploited Vulnerabilities catalog. The…

This website uses cookies.