US CISA added an actively exploited vulnerability in the ZK Java Web Framework to its Known Exploited Vulnerabilities Catalog. U.S.…
Resecurity identified one of the largest investment fraud networks, tracked as Digital Smoke, by size and volume of operations. Resecurity…
Threat actors hacked the home computer of a DevOp engineer, they installed a keylogger as part of a sophisticated cyber…
Data allegedly stolen from the American gaming giant Activision in December security breach were leaked on a cybercrime forum. A…
Researchers detailed a new wave of attacks distributing the PlugX RAT disguised as a legitimate Windows debugger tool. Trend Micro…
The Dutch police arrested three individuals as a result of an investigation into computer trespass, data theft, extortion, extortion, and…
An unknown threat actor is targeting government organizations with the PureCrypter downloader, Menlo Security firm reported. Menlo Labs researchers uncovered…
Threat actors behind the ChromeLoader malware campaign are using VHD files disguised as popular games, experts warn. Researchers from Ahnlab Security Emergency…
The producers of fruit and vegetables Dole Food Company disclosed a ransomware attack that impacted its operations. Dole Food Company is an Irish agricultural…
The group of hacktivists CH01 defaced at least 32 Russian websites to mark a protest over the one-year anniversary of…
This website uses cookies.