The Threat Report Portugal: H2 2022 compiles data collected on the malicious campaigns that occurred from July to December, H2,…
Google's Threat Analysis Group (TAG) warns of a North Korea-linked cyberespionage group tracked as ARCHIPELAGO. Google's Threat Analysis Group (TAG)…
A series of vulnerabilities in multiple smart devices manufactured by Nexx can be exploited to remotely open garage doors, and…
The eFile.com online service, which is authorized by the US Internal Revenue Service (IRS), was spotted serving malicious malware to…
HP would take up to 90 days to address a critical flaw, tracked as CVE-2023-1707, that resides in the firmware…
The CISA 's Joint Cyber Defense Collective (JCDC) initiative is going to build operation plans for protecting and responding to…
Law enforcement seized the Genesis Market black marketplace, a platform focused on the sale of stolen credentials, as part of Operation…
Resecurity has recently identified the STYX Marketplace, a new cybercriminal e-commerce platform with a specialized focus on financial fraud and…
An ALPHV/BlackCat ransomware affiliate was spotted exploiting vulnerabilities in the Veritas Backup solution. An affiliate of the ALPHV/BlackCat ransomware gang, tracked as…
A new ransomware strain named Rorschach ransomware supports the fastest file-encrypting routine observed to date. Check Point Research (CPR) and…
This website uses cookies.