The REvil ransomware gang has resumed its operations, experts found a new encryptor and a new attack infrastructure. The REvil ransomware…
The latest executive order from the Italian ACN agency recommends government agencies to replace Group IB solutions with alternatives as…
IoT gizmos make our lives easier, but we forget that these doohickeys are IP endpoints that act as mini-radios. They…
Russia-linked APT29 (Cozy Bear or Nobelium) launched a spear-phishing campaign targeting diplomats and government entities. In mid-January 2022, security researchers…
Threat actors exploited a bug in the Fuse protocol used by DeFi platforms Rari Capital and Fei Protocol and stole…
This post provides a timeline of the events related to the Russian invasion of Ukraine from the cyber security perspective.…
A new round of the weekly Security Affairs newsletter arrived! Every week the best security articles from Security Affairs free…
Researchers discovered flaws in the Azure Database for PostgreSQL Flexible Server that could result in unauthorized cross-account database access in…
Emotet operators are testing new attack techniques in response to Microsoft's move to disable Visual Basic for Applications (VBA) macros…
OpRussia continues, less than a week after my last update Anonymous has hacked other Russian companies and leaked their data…
This website uses cookies.