An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware

3 years ago

Researchers warn of an ongoing aggressive Qakbot malware campaign that leads to Black Basta ransomware infections in the US. Experts…

Threat actors exploit discontinues Boa web servers to target critical infrastructure

3 years ago

Microsoft reported that hackers have exploited flaws in a now-discontinued web server called Boa in attacks against critical industries. Microsoft experts…

Pro-Russian group Killnet claims responsibility for DDoS attack that has taken down the European Parliament site

3 years ago

Pro-Russian hacker collective Killnet took down the European Parliament website with a DDoS cyberattack. The Pro-Russia group of hacktivists Killnet…

Ducktail information stealer continues to evolve

3 years ago

The operators behind the Ducktail information stealer continue to improve their malicious code, operators experts warn. In late July 2022,…

Experts claim that iPhone’s analytics data is not anonymous

3 years ago

Researchers discovered that analytics data associated with iPhone include Directory Services Identifier (DSID) that could allow identifying users. Researchers at…

Microsoft releases out-of-band update to fix Kerberos auth issues caused by a patch for CVE-2022-37966

3 years ago

Microsoft released an out-of-band update to fix problems tied to a recent Windows security patch that caused Kerberos authentication issues.…

Exclusive – Quantum Locker lands in the Cloud

3 years ago

The gang behind Quantum Locker used a particular modus operandi to target large enterprises relying on cloud services in the…

5 API Vulnerabilities That Get Exploited by Criminals

3 years ago

Let's give a look at API vulnerabilities by reading the API Security Top 10 published by the Open Web Application…

Researcher warns that Cisco Secure Email Gateways can easily be circumvented

3 years ago

A researcher revealed how to bypass some of the filters in Cisco Secure Email Gateway appliance and deliver malware using…

Aurora Stealer Malware is becoming a prominent threat in the cybercrime ecosystem

3 years ago

Researchers warn of threat actors employing a new Go-based malware dubbed Aurora Stealer in attacks in the wild. Aurora Stealer…

This website uses cookies.