Threat actors planted a backdoor into multiple WordPress themes and plugins after compromising the website of their developer. In a…
Russian authorities arrested four alleged members of the international cyber theft ring tracked as 'Infraud Organization.' In February 2008, the…
Experts warn Emotet malware campaign using "unconventional" IP address formats in an attempt to evade detection. Threat actors behind a…
The FBI warns that cybercriminals are using malicious QR codes to steal their credentials and financial info. The Federal Bureau of…
Cybersecurity provider F5 released security patches to address 25 vulnerabilities affecting its BIG-IP, BIG-IQ, and NGINX products. Cybersecurity firm F5…
OpenSubtitles has suffered a data breach, the maintainers confirmed that the incident impacted 7 Million subscribers. OpenSubtitles is a popular…
US CISA added seventeen new actively exploited vulnerabilities to the 'Known Exploited Vulnerabilities Catalog'. The 'Known Exploited Vulnerabilities Catalog' is…
Cyberespionage group Molerats has been observed abusing legitimate cloud services, like Google Drive and Dropbox as attack infrastructure. Zscaler ThreatLabz…
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…
The Dutch National Cybersecurity Centre (NCSC) warns organizations of risks associated with cyberattacks exploiting the Log4J vulnerability. The Dutch National…
This website uses cookies.