Experts recently discovered a multi-platform ransomware, dubbed Tycoon Ransomware, that uses a Java image file (JIMAGE) to evade detection. Experts…
Cyber Defense Magazine June 2020 Edition has arrived. We hope you enjoy this month's edition…packed with over 165 pages of…
Google researchers revealed that campaign staffs for both President Donald Trump and Joe Biden have been targeted recently by foreign…
A Chinese threat actor tracked as Cycldek (aka Goblin Panda, or Conimes) has developed new tool to steal information from…
North Atlantic Council issued a statement warning of concerning malicious cyber activities against entities involved in the fight against COVID-19.…
Security experts have observed a large-scale campaign over the weekend aimed at stealing configuration files from WordPress sites. Security researchers…
Hackers hijacked one of the domains of the Japanese cryptocurrency exchange Coincheck and used it for spear-phishing attacks. The Japanese…
REvil /Sodinokibi ransomware operators launch an auction site to sell data stolen from victims that have chosen to not pay…
Several flaws in the Exim mail transfer agent (MTA) have been exploited by Russia-linked hackers, hundreds of thousands of servers…
A flaw in the IP-in-IP tunneling protocol that can be exploited for DoS attacks and to bypass security controls impact…
This website uses cookies.