Cuba ransomware gang received more than $60 million in ransom payments related to attacks against 100 entities worldwide as of…
Experts found multiple flaws in three Android Keyboard apps that can be exploited by remote attackers to compromise a mobile…
Redigo is a new Go-based malware employed in attacks against Redis servers affected by the CVE-2022-0543 vulnerability. Researchers from security firm…
Data breaches can be devastating for organizations, these are 3 of the worst incidents that could have been prevented Data…
North Korea-linked ScarCruft group used a previously undocumented backdoor called Dolphin against targets in South Korea. ESET researchers discovered a previously undocumented backdoor called Dolphin…
LastPass disclosed a new security breach, threat actors had access to its cloud storage using information stolen in the August…
Google’s Threat Analysis Group (TAG) linked three exploitation frameworks to a Spanish surveillance spyware vendor named Variston. While tracking the…
Threat actors are exploiting interest in a popular TikTok challenge, dubbed Invisible Challenge, to trick users into downloading info-stealing malware.…
An alleged China-linked cyberespionage group, tracked as UNC4191, used USB devices in attacks aimed at Philippines entities. Mandiant researchers spotted…
CyberNews experts discovered that ENC Security, a Netherlands software company, had been leaking critical business data since May 2021. Original…
This website uses cookies.