Cybersecurity researchers exposed new evasion techniques adopted by an advanced malware downloader called GuLoader. CrowdStrike researchers d a detailed multiple evasion…
Threat actors are actively exploiting a critical flaw in the YITH WooCommerce Gift Cards Premium WordPress plugin installed by over…
A threat actor is claiming they have obtained data of 400,000,000 Twitter users and is offering it for sale. A…
A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles from Security Affairs free for…
The Raspberry Robin worm attacks aimed at telecommunications and government office systems across Latin America, Australia, and Europe. Researchers from Trend Micro…
Online sports betting company BetMGM suffered a data breach and threat actors offered for sale a database containing the data…
The data breach suffered by LastPass in August 2022 may have been more severe than previously thought. In August password management…
The Vice Society ransomware group has adopted new custom ransomware, with a strong encryption scheme, in recent intrusions. SentinelOne researchers…
Microsoft spotted an upgraded variant of the Zerobot botnet that spreads by exploiting Apache vulnerabilities. Microsoft Threat Intelligence Center (MSTIC)…
Play ransomware attacks target Exchange servers with a new exploit that bypasses Microsoft’s ProxyNotShell mitigations. Play ransomware operators target Exchange…
This website uses cookies.