<strong>Attack of drones: airborne cybersecurity nightmare</strong>

3 years ago

Threat actors could exploit drones for payload delivery, kinetic operations, and even diversion, experts warn. Original post at https://cybernews.com/security/drones-hack-airborne-cybersecurity-nightmare/ Once…

Cuba Ransomware received over $60M in Ransom payments as of August 2022

3 years ago

Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of…

Android Keyboard Apps with 2 Million downloads can remotely hack your device

3 years ago

Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile…

New Go-based Redigo malware targets Redis servers

3 years ago

Redigo is a new Go-based malware employed in attacks against Redis servers affected by the CVE-2022-0543 vulnerability. Researchers from security firm…

3 of the Worst Data Breaches in the World That Could Have Been Prevented

3 years ago

Data breaches can be devastating for organizations, these are 3 of the worst incidents that could have been prevented Data…

North Korea ScarCruft APT used previously undetected Dolphin Backdoor against South Korea

3 years ago

North Korea-linked ScarCruft group used a previously undocumented backdoor called Dolphin against targets in South Korea. ESET researchers discovered a previously undocumented backdoor called Dolphin…

Lastpass discloses the second security breach this year

3 years ago

LastPass disclosed a new security breach, threat actors had access to its cloud storage using information stolen in the August…

Google links three exploitation frameworks to Spanish commercial spyware vendor Variston

3 years ago

Google’s Threat Analysis Group (TAG) linked three exploitation frameworks to a Spanish surveillance spyware vendor named Variston. While tracking the…

Attackers abused the popular TikTok Invisible Challenge to spread info-stealer

3 years ago

Threat actors are exploiting interest in a popular TikTok challenge, dubbed Invisible Challenge, to trick users into downloading info-stealing malware.…

China-linked UNC4191 APT relies on USB Devices in attacks against entities in the Philippines

3 years ago

An alleged China-linked cyberespionage group, tracked as UNC4191, used USB devices in attacks aimed at Philippines entities. Mandiant researchers spotted…

This website uses cookies.