Cyber Attacks 115
- Unveiling Proton66: Mass Scanning and Exploitation Campaigns Exposed
- Phishing Detection Pitfalls: Why Attacks Bypass Defenses
- Iranian Cyber Espionage: UNC2428 Targets Israel with MURKYTOUR Malware
- Chinese Cybercriminals Unleash Z-NFC Tool for Targeted Payment Fraud
- Marks & Spencer Faces Cyber Incident: Managing Customer Complaints and Service Disruptions
- Lotus Panda's Cyber Espionage Campaign: Targeting Southeast Asian Governments
- Japan's FSA Alerts on Unauthorized Trades via Stolen Credentials from Fake Security Firms' Sites
- Zoom Remote Control Feature Exploited by Hackers for Cryptocurrency Theft
- Cookie-Bite Attack: Chrome Extension Exploit Steals Session Tokens
- Abilene, Texas, Shuts Down Systems After Cyberattack
- Kimsuky APT Exploits BlueKeep RDP Flaw in Cyber Attacks on South Korea and Japan
- Global Cyber Attacks Fueled by Russian Bulletproof Host Proton66
- Alarming Surge: Emails Delivering Infostealers Increase by 84% Year-over-Year
- APT29 Deploys Grapeloader Malware: Targeting European Diplomats with Wine-Tasting Lures
- 7 Crucial Steps to Take After a Credential-Based Cyberattack
- State-Sponsored Cyber Attacks: The Rising Threat of ClickFix Tactics
- Mustang Panda's Advanced Cyber Attack on Myanmar: New Tactics and Enhanced Malware
- China Accuses US of Cyber Espionage During 2025 Asian Winter Games
- DaVita Kidney Dialysis Firm Targeted by Weekend Ransomware Attack: Service Disruptions Reported
- China Admits to Directing Cyberattacks on US Infrastructure: A Major Geopolitical Shift
- The Resurgence of Hacktivism: Unmasking State-Backed Cyber Threats
- China Acknowledges Role in Volt Typhoon Cyberattacks on U.S. Infrastructure
- Tycoon2FA Phishing Kit: Enhanced Threats to Microsoft 365 Security
- China's Surprising Admission: Hacking US Infrastructure
- Cyber Threat Alert: Paper Werewolf Targets Russian Sectors with PowerModul Implant
- Gamaredon's Latest Cyber Attack: Infected Drives Target Western Military Mission in Ukraine
- Europol's Coordinated Operation Takes Down Five SmokeLoader Malware Clients
- Surge in Cyberattacks: Two-Thirds of Financial Institutions Targeted in 2024
- Everest Ransomware’s Dark Web Leak Site Hacked and Taken Offline
- Cybercrime Group Scattered Spider Member Pleads Guilty to Major Charges
- Combating Phishing Attacks: Law Enforcement’s Crucial Role
- Unmasking PoisonSeed: The Phishing Campaign Targeting Crypto Wallets
- OPSEC Blunder Reveals Cybercriminal Operations on Bulletproof Hosting
- CERT-UA Unveils Cyberattacks Using WRECKSTEEL Malware Against Ukrainian State Systems
- Massive Credential Stuffing Attacks Target Australian Pension Funds
- Phishing Alert: QR Codes in Email Attachments Pose New Threats
- Microsoft Alerts: Tax-Themed Phishing Attacks Using PDFs and QR Codes Deliver Malware
- Lazarus Group Exploits Job Seekers with ClickFix Tactic to Deploy GolangGhost Malware
- Hunters International Rebrands: Shifting from Ransomware to Data Extortion
- Europol-Led Operation Dismantles Global CSAM Platform Kidflix, Leading to 79 Arrests
- CISA Alerts on Fast Flux DNS Evasion Tactics Employed by Cybercrime Groups
- Massive PostgreSQL Exploit: Over 1,500 Servers Hit by Cryptocurrency Mining Campaign
- Expansion of North Korean IT Operations: A Growing Threat in Europe
- Lucid PhaaS: A Global Smishing Threat via iMessage and RCS
- Earth Alux: China-Linked Cyber Threat Targets APAC and LATAM Regions
- Lucid Phishing Platform: A Surge in iOS and Android SMS Attacks
- North Korean Hackers Deploy ClickFix Tactics to Infiltrate Crypto Firms
- Morphing Meerkat Phishing Kits: An In-Depth Look at DNS MX Record Exploitation
- FamousSparrow Hackers Upgrade Malware in Latest Cyber Attacks
- Pakistan-Linked APT36 Group Targets India Post Users with Malware Campaign
- RedCurl's Strategic Shift: From Espionage to Ransomware with QWCrypt
- RedCurl Cyberspies Launch Ransomware Targeting Hyper-V Servers
- Alarming Surge: Ransomware Up 132%, Vishing Soars 1,633%
- Unveiling New SparrowDoor Backdoor Variants in U.S. and Mexican Cyber Attacks
- Android Malware Leverages .NET MAUI for Evasion Tactics
- Are Supply Chains Secure Amid Rising Nation-State Hacking Threats?
- AI-Driven Phishing: A Surge in Sophisticated Cyber Attacks
- 23andMe Files for Chapter 11: CEO Steps Down Amid Financial Turmoil and Cyber Threats
- North Korean Lazarus Hackers Leverage npm Packages for Widespread Cyber Attacks
- US Lifts Sanctions on Tornado Cash Crypto Mixer: Implications and Analysis
- UAT-5918: Advanced Threat Actor Targets Taiwan’s Critical Infrastructure
- Kaspersky Unveils Collaboration Between Head Mare and Twelve Threat Groups Targeting Russian Entities
- Aquatic Panda: China-Linked APT's Global Espionage Campaign Exposed
- Targeted Cyber Attacks on Ukrainian Military via Compromised Signal Accounts
- Alarming Surge: Phishing Attacks Skyrocket by 140% Year-Over-Year
- Enhancing SaaS Security: 5 Must-Haves for Identity Threat Detection & Response
- Unraveling the Cascading Supply Chain Attack: GitHub Action Hack Exposed
- Cyber Extortionists Threaten to Involve Edward Snowden in Data Breach Scheme
- China-Linked MirrorFace Cyber Espionage: Deploying ANEL and AsyncRAT in European Union Attack
- OKX Halts DEX Aggregator after Lazarus Group Laundering Attempt
- Chinese Threat Actor Infiltrates U.S. Electric Grid for Nearly a Year
- BlackLock Ransomware Surges with Nearly 50 Attacks in Just Two Months
- Beware: Malicious OAuth Apps Pose as Adobe and DocuSign to Target Microsoft 365 Users
- Fake 'Security Alert' Issues on GitHub Exploit OAuth App to Hijack Accounts
- Ransomware Attack Cripples Yap's Health System: A Deep Dive into the Cyber Threat
- Black Basta Ransomware Introduces BRUTED: Automated VPN Brute-Force Tool
- Israeli LockBit Developer Extradited to U.S. for Cybercrime Charges
- CISA Under Siege: Trump’s Purge and Its Impact on U.S. Cybersecurity
- The Rising Tide of Cyberattacks: Top Organizational Threats in 2024
- Beware: ClickFix Attack Spreads Malware Through Fake Booking.com Emails
- Analyzing the Cyberattack on MacOS: Insights from Cybersecurity Experts
- CISA Alert: Medusa Ransomware Strikes Over 300 Critical Infrastructure Organizations
- Chinese Hackers Exploit Juniper Networks Routers with Custom Backdoors and Rootkits
- Unveiling the Truth Behind the DDoS Attacks That Crippled X
- The AI Arms Race: How Cybersecurity is Catching Up to AI-Driven Threats
- Unveiling Steganography: How XWorm Exploits Images for Cyber Attacks
- Advanced Persistent Threat: SideWinder Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa
- Colombian Institutions Under Siege: Blind Eagle Exploits NTLM Flaw, RATs & GitHub Attacks
- Developer Convicted for Sabotaging Ex-Employer's Systems with Kill Switch
- Critical Zero-Day Flaw in Edimax IP Cameras Exploited by Mirai-Based Botnets
- Visual representation of the code in Dev Tools
- The creator of malware has infected her own computer
- Adrozek malware Ad-injecting hijacks
- How to enable DNS over HTTPS in Chrome
- Cloudflare Notification about increase in ransom DDoS threats
- How to lock the camera and microphone on laptop?
- WhatsApp voicemail scam
- Top 7 Biggest Data Breaches of the 21st Century
- There is a mass mailing of the Troldesh cipher virus on behalf of Russian companies
- The full MySQL dump of the hhide.org hacker forum database was freely available
- Structured Threat Intelligence Graph – new tool to protect the grid from cyber attacks
- Spammers use Google services
- Slack warns investors about possible cyber attacks
- OWASP mobile top 10 security risks explained with real world examples
- Over 50,000 Windows MS-SQL and PHPMyAdmin Servers Worldwide with 20 Different Payloads
- NEWS Backdoor spreads as a fake Chrome update
- China proposes replacing TCP / IP with New IP
- Android.Circle ad trojan and clicker has been installed more than 700,000 times
- Malwarebytes warns Mac threats are growing
- How To Configure Cloudflare To Maximize WordPress Speed + Security
- Google Calendar scam adds malicious links to your schedule
- GOLDBRUTE BOTNET attacks Windows-systems with active connection via RDP
- Echobot malware is a smorgasbord of vulnerabilities
- Applications with 1.5 million installations engaged in click fraud and discharged device batteries
- WordPress plugin can let hackers wipe up to 200,000 sites