Tor Project removed several relays associated with a suspicious cryptocurrency scheme

2 years ago

The Tor Project removed several relays that were used as part of a cryptocurrency scheme and represented a threat to…

Experts warn of a surge in NetSupport RAT attacks against education and government sectors

2 years ago

Experts warn of a surge in NetSupport RAT attacks against education, government, and business services sectors. The Carbon Black Managed…

The Top 5 Reasons to Use an API Management Platform

2 years ago

Organizations need to govern and control the API ecosystem, this governance is the role of API management. Uber uses APIs…

Canadian government impacted by data breaches of two of its contractors

2 years ago

The Canadian government discloses a data breach after threat actors hacked two of its contractors.  The Canadian government declared that…

Rhysida ransomware gang is auctioning data stolen from the British Library

2 years ago

The Rhysida ransomware group claimed responsibility for the recent cyberattack on the British Library that has caused a major IT…

Russia-linked APT29 group exploited WinRAR 0day in attacks against embassies

2 years ago

Russia-linked cyberespionage group APT29 has been observed leveraging the CVE-2023-38831 vulnerability in WinRAR in recent attacks. The Ukrainian National Security…

DarkCasino joins the list of APT groups exploiting WinRAR zero-day

2 years ago

The DarkCasino APT group leveraged a recently disclosed WinRAR zero-day vulnerability tracked as CVE-2023-38831. Researchers at cybersecurity firm NSFOCUS analyzed…

US teenager pleads guilty to his role in credential stuffing attack on a betting site

2 years ago

US teenager Joseph Garrison pleads guilty to carrying out a credential stuffing attack on a betting website. US teenager Joseph…

Security Affairs newsletter Round 446 by Pierluigi Paganini – INTERNATIONAL EDITION

2 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs are free…

8Base ransomware operators use a new variant of the Phobos ransomware

2 years ago

8Base ransomware operators were observed using a variant of the Phobos ransomware in a recent wave of attacks. Cisco Talos researchers…

This website uses cookies.