Nuclear Regulation Authority shut down email systems after a cyber attack

5 years ago

Japan’s Nuclear Regulation Authority (NRA) issued a warning of temporary suspension of its email systems, likely caused by a cyber…

Maze ransomware is going out of the business

5 years ago

The Maze ransomware operators are shutting down their operations for more than one year the appeared on the threat landscape…

Security Affairs newsletter Round 287

5 years ago

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…

A data breach broker is selling account databases of 17 companies

5 years ago

A threat actor is offering for sale account databases containing an aggregate total of 34 million user records stolen from…

103,000 machines are still vulnerable to SMBGhost attacks

5 years ago

Eight months after Microsoft issued a patch for the critical SMBGhost issues over 100,000 systems exposed online are still vulnerable…

REvil ransomware gang hacked gaming firm Gaming Partners International

5 years ago

The REvil ransomware operators made the headlines again, this time the gang claims to have hacked the Gaming Partners International…

Companies paid $4.2M bug bounties for XSS flaws in 2020

5 years ago

Cross-Site Scripting (XSS) issues are the most common vulnerabilities that received the highest amount of rewards on the HackerOne vulnerability…

Emotet operators are running Halloween-themed campaigns

5 years ago

Crooks behind Emotet malware attempt to take advantage of the Halloween festivity, a new campaign could invite you to a…

Operation Earth Kitsune: hackers target the Korean diaspora

5 years ago

Experts uncovered a new watering hole attack, dubbed Operation Earth Kitsune, targeting the Korean diaspora that exploits flaws in web…

Google discloses unpatched Windows zero-day exploited in the wild

5 years ago

Google researchers disclosed today a zero-day vulnerability in the Windows operating system that is currently under active exploitation. Security researchers…

This website uses cookies.