FBI shares with HIBP 4 million email addresses involved in Emotet attacks

5 years ago

The FBI has shared with Have I Been Pwned service 4 million email addresses collected by Emotet botnet and employed…

CISA, NIST published an advisory on supply chain attacks

5 years ago

CISA and NIST published a report on software supply chain attacks that shed light on the associated risks and provide…

Ransomware hit Guilderland Central School District near Albany

5 years ago

Officials revealed that the school district near Albany was hit by a ransomware attack that forced students in grades 7…

Microsoft Defender uses Intel TDT technology against crypto-mining malware

5 years ago

Microsoft announced an improvement of its Defender antivirus that will leverage Intel's Threat Detection Technology (TDT) to detect processes associated…

Shlayer macOS malware abuses zero-day to bypass Gatekeeper feature

5 years ago

Apple addresses a zero-day in macOS exploited by Shlayer malware to bypass Apple's security features and deliver second-stage malicious payloads. Apple…

Boffins found a bug in Apple AirDrop that could leak users’ personal info

5 years ago

Experts found a bug in Apple's wireless file-sharing protocol Apple AirDrop that could expose user's contact information. Boffins from the…

Bye Bye Emotet, law enforcement pushed the uninstall code via the botnet

5 years ago

European law enforcement has conducted an operation aimed at performing a mass-sanitization of computers infected with the infamous Emotet Windows…

Prometei botnet is targeting ProxyLogon Microsoft Exchange flaws

5 years ago

Attackers are exploiting the ProxyLogon flaws in Microsoft Exchange to recruit machines in a cryptocurrency botnet tracked as Prometei. Experts…

A supply chain attack compromised the update mechanism of Passwordstate Password Manager

5 years ago

The software company Click Studios was the victim of a supply chain attack, hackers compromised its Passwordstate password management application. Another…

Hackers are targeting Soliton FileZen file-sharing servers

5 years ago

Threat actors are exploiting two flaws in the popular file-sharing server FileZen to steal sensitive data from businesses and government…

This website uses cookies.