information security news

Leaked source code of Babuk ransomware used by 10 different ransomware families targeting VMware ESXi

The leak of the source code of the Babuk ransomware allowed 9 ransomware gangs to create their own ransomware targeting…

3 years ago

What the Email Security Landscape Looks Like in 2023

Email-based threats have become increasingly sophisticated, how is changing the Email Security Landscape? For over a decade, email has been…

3 years ago

The Black Basta ransomware gang hit multinational company ABB

Swiss electrification and automation technology giant ABB suffered a Black Basta ransomware attack that impacted its business operations. Swiss multinational…

3 years ago

A flaw in the Essential ‘Addons for Elementor’ WordPress plugin poses 1M sites at risk of hacking

Experts warn of an unauthenticated privilege escalation flaw in the popular Essential 'Addons for Elementor' WordPress plugin. Essential 'Addons for…

3 years ago

Experts share details of five flaws that can be chained to hack Netgear RAX30 Routers

Researchers disclosed the details of five vulnerabilities that can be chained to take over some Netgear router models. Industrial and…

3 years ago

Google will provide dark web monitoring to all US Gmail users and more

Google announced the opening of the dark web monitoring report security feature to all Gmail users in the United States.…

3 years ago

North Korea-linked APT breached the Seoul National University Hospital

The Korean National Police Agency (KNPA) warns that a North Korea-linked APT group had breached the Seoul National University Hospital…

3 years ago

Twitter now supports Encrypted Direct Messages, with some limitations

Twitter is rolling out support for encrypted direct messages (DMs), the security feature will be initially available for the verified users.…

3 years ago

A zero-click vulnerability in Windows allows stealing NTLM credentials

Researchers shared technical details about a flaw in Windows MSHTML platform, tracked as CVE-2023-29324, that could be abused to bypass security protections. Cybersecurity…

3 years ago

Cybersecurity firm Dragos shared details about a failed extortion attempt it suffered

Industrial cybersecurity firm Dragos revealed that a ransomware group attempted to breach its infrastructure and extort it. Industrial cybersecurity firm…

3 years ago

This website uses cookies.