IT Information Security

Operation WrtHug hijacks 50,000+ ASUS routers to build a global botnet

Operation WrtHug hijacks tens of thousands of outdated ASUS routers worldwide, mainly in Taiwan, the U.S., and Russia, forming a…

3 months ago

U.S. CISA adds a new Fortinet FortiWeb flaw to its Known Exploited Vulnerabilities catalog

U.S. CISA has added a second Fortinet FortiWeb vulnerability in just a few days to its Known Exploited Vulnerabilities catalog.…

3 months ago

Eurofiber confirms November 13 hack, data theft, and extortion attempt

Eurofiber says hackers exploited a flaw on November 13, breached its ticket and customer portals, stole data, and attempted extortion.…

3 months ago

New FortiWeb zero-day CVE-2025-58034 under attack patched by Fortinet

Fortinet patched a new FortiWeb zero-day, tracked as CVE-2025-58034, which attackers are actively exploiting. Fortinet patched a new FortiWeb zero-day,…

3 months ago

Pennsylvania Office of the Attorney General (OAG) confirms data breach after August attack

The Pennsylvania Office of the Attorney General ("OAG") confirms a data breach following a ransomware attack by Inc Ransom group.…

3 months ago

DoorDash data breach exposes personal info after social engineering attack

DoorDash says a social engineering attack led to a data breach exposing names, addresses, emails, and phone numbers of users,…

3 months ago

Dutch police takes down bulletproof hosting hub linked to 80+ cybercrime cases

Dutch police seized 250 servers running a bulletproof hosting service tied to cybercriminals and linked to over 80 investigations since…

3 months ago

Microsoft mitigated the largest cloud DDoS ever recorded, 15.7 Tbps

Microsoft says the Aisuru botnet launched a 15.7 Tbps DDoS on Azure from 500k IPs, using massive UDP floods peaking…

3 months ago

Jaguar Land Rover confirms major disruption and £196M cost from September cyberattack

Jaguar Land Rover says the September 2025 cyberattack halted production, led to data theft, and cost £196M in the quarter.…

3 months ago

North Korean threat actors use JSON sites to deliver malware via trojanized code

North Korean Contagious Interview actors now host malware on JSON storage sites to deliver trojanized code projects, NVISO reports. North…

3 months ago

This website uses cookies.