Norton Healthcare disclosed a data breach after a ransomware attack

2 years ago

Kentucky health system Norton Healthcare disclosed a data breach after it was a victim of a ransomware attack in May.…

Bypassing major EDRs using Pool Party process injection techniques

2 years ago

Researchers devised a novel attack vector for process injection, dubbed Pool Party, that evades EDR solutions. Researchers from cybersecurity firm…

Founder of Bitzlato exchange has pleaded for unlicensed money transmitting

2 years ago

Anatoly Legkodymov, the founder of the Bitzlato cryptocurrency exchange has pleaded in a money-laundering scheme. Anatoly Legkodymov (41) (aka Anatolii…

Android barcode scanner app exposes user passwords

2 years ago

An Android app with over 100k Google Play downloads and a 4.5-star average rating has let an open instance go…

Russia-linked APT8 exploited Outlook zero-day to target European NATO members

2 years ago

Russia-linked group APT28 exploited Microsoft Outlook zero-day to target European NATO members, including a NATO Rapid Deployable Corps. Palo Alto…

UK and US expose Russia Callisto Group’s activity and sanction members

2 years ago

The UK NCSC and Microsoft warned that Russia-linked threat actor Callisto Group is targeting organizations worldwide. The UK National Cyber…

A cyber attack hit Nissan Oceania

2 years ago

Japanese carmaker Nissan announced it has suffered a cyberattack impacting the internal systems at Nissan Oceania. Nissan Oceania, the regional…

New Krasue Linux RAT targets telecom companies in Thailand

2 years ago

A previously undetected Linux RAT dubbed Krasue has been observed targeting telecom companies in Thailand. Group-IB researchers discovered a previously…

Atlassian addressed four new RCE flaws in its products

2 years ago

Australian Software giant Atlassian addressed four critical Remote Code Execution (RCE) vulnerabilities in its products. Atlassian released security patches to address four…

CISA adds Qualcomm flaws to its Known Exploited Vulnerabilities catalog

2 years ago

U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds four Qualcomm vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and…

This website uses cookies.