Law enforcement seized the servers and customer logs for DoubleVPN, a double-encryption service widely used by threat actors for malicious…
Russia-linked threat actors compromised Denmark’s central bank (Danmarks Nationalbank) and remained in its systems for months. Russia-linked threat actors infected…
A new massive LinkedIn breach made the headlines, the leak reportedly exposes the data of 700M users, more than 92%…
Proof-of-concept exploit code for CVE-2021-1675 flaw, an attacker could exploit it to compromise Windows systems. Proof-of-concept exploit code for the…
The REvil ransomware operators added a Linux encryptor to their arsenal to encrypt Vmware ESXi virtual machines. The REvil ransomware…
Researchers analyzed a recently discovered threat, the Lorenz ransomware, and developed a free decryptor for the victims of this new…
Code repository hosting service GitHub announced that it has paid out more than $1.5 million through its bug bounty program since…
Microsoft is investigating an strange attack, threat actor used a driver signed by the company, the Netfilter Driver, to implant…
The builder for the Babuk Locker ransomware was leaked online, threat actors can use it to create their own ransomware…
Researchers discovered six rogue packages in the official Python programming language’s PyPI repository containg cryptocurrency mining malware. Experts from security firm Sonatype have…
This website uses cookies.