Researchers analyzed a recently discovered threat, the Lorenz ransomware, and developed a free decryptor for the victims of this new…
Microsoft is investigating an strange attack, threat actor used a driver signed by the company, the Netfilter Driver, to implant…
The builder for the Babuk Locker ransomware was leaked online, threat actors can use it to create their own ransomware…
Researchers discovered six rogue packages in the official Python programming language’s PyPI repository containg cryptocurrency mining malware. Experts from security firm Sonatype have…
Researchers have discovered a strain of cryptocurrency-mining malware, tracked as Crackonosh, that abuses Windows Safe mode to avoid detection. Researchers from Avast…
On June 14th, Altus Group, a commercial real estate software solutions firm, disclosed a security breach, now Hive ransomware gang…
Cybercriminals published for sale in Dark Web 58GB of data stolen from Hollingsworth LLP. One of the emerging underground marketplaces…
The Clop ransomware members that were recently arrested laundered over $500M in ransomware payments for several malicious actors. The members of…
Flaws affecting the BIOSConnect feature of Dell Client BIOS could be exploited by a privileged attacker to execute arbitrary code…
The LV ransomware operators repurposed a REvil binary to create their own strain and launch a ransomware-as-a-service (RaaS). A threat…
This website uses cookies.