Cyber Attacks 77
- Phishing Alert: QR Codes in Email Attachments Pose New Threats
- Microsoft Alerts: Tax-Themed Phishing Attacks Using PDFs and QR Codes Deliver Malware
- Lazarus Group Exploits Job Seekers with ClickFix Tactic to Deploy GolangGhost Malware
- Europol-Led Operation Dismantles Global CSAM Platform Kidflix, Leading to 79 Arrests
- CISA Alerts on Fast Flux DNS Evasion Tactics Employed by Cybercrime Groups
- Massive PostgreSQL Exploit: Over 1,500 Servers Hit by Cryptocurrency Mining Campaign
- Expansion of North Korean IT Operations: A Growing Threat in Europe
- Lucid PhaaS: A Global Smishing Threat via iMessage and RCS
- Earth Alux: China-Linked Cyber Threat Targets APAC and LATAM Regions
- Lucid Phishing Platform: A Surge in iOS and Android SMS Attacks
- Morphing Meerkat Phishing Kits: An In-Depth Look at DNS MX Record Exploitation
- Pakistan-Linked APT36 Group Targets India Post Users with Malware Campaign
- RedCurl's Strategic Shift: From Espionage to Ransomware with QWCrypt
- RedCurl Cyberspies Launch Ransomware Targeting Hyper-V Servers
- Alarming Surge: Ransomware Up 132%, Vishing Soars 1,633%
- Unveiling New SparrowDoor Backdoor Variants in U.S. and Mexican Cyber Attacks
- Android Malware Leverages .NET MAUI for Evasion Tactics
- Are Supply Chains Secure Amid Rising Nation-State Hacking Threats?
- AI-Driven Phishing: A Surge in Sophisticated Cyber Attacks
- 23andMe Files for Chapter 11: CEO Steps Down Amid Financial Turmoil and Cyber Threats
- North Korean Lazarus Hackers Leverage npm Packages for Widespread Cyber Attacks
- US Lifts Sanctions on Tornado Cash Crypto Mixer: Implications and Analysis
- UAT-5918: Advanced Threat Actor Targets Taiwan’s Critical Infrastructure
- Kaspersky Unveils Collaboration Between Head Mare and Twelve Threat Groups Targeting Russian Entities
- Aquatic Panda: China-Linked APT's Global Espionage Campaign Exposed
- Targeted Cyber Attacks on Ukrainian Military via Compromised Signal Accounts
- Alarming Surge: Phishing Attacks Skyrocket by 140% Year-Over-Year
- Enhancing SaaS Security: 5 Must-Haves for Identity Threat Detection & Response
- Unraveling the Cascading Supply Chain Attack: GitHub Action Hack Exposed
- Cyber Extortionists Threaten to Involve Edward Snowden in Data Breach Scheme
- China-Linked MirrorFace Cyber Espionage: Deploying ANEL and AsyncRAT in European Union Attack
- OKX Halts DEX Aggregator after Lazarus Group Laundering Attempt
- Chinese Threat Actor Infiltrates U.S. Electric Grid for Nearly a Year
- BlackLock Ransomware Surges with Nearly 50 Attacks in Just Two Months
- Beware: Malicious OAuth Apps Pose as Adobe and DocuSign to Target Microsoft 365 Users
- Fake 'Security Alert' Issues on GitHub Exploit OAuth App to Hijack Accounts
- Ransomware Attack Cripples Yap's Health System: A Deep Dive into the Cyber Threat
- Black Basta Ransomware Introduces BRUTED: Automated VPN Brute-Force Tool
- Israeli LockBit Developer Extradited to U.S. for Cybercrime Charges
- CISA Under Siege: Trump’s Purge and Its Impact on U.S. Cybersecurity
- The Rising Tide of Cyberattacks: Top Organizational Threats in 2024
- Beware: ClickFix Attack Spreads Malware Through Fake Booking.com Emails
- Analyzing the Cyberattack on MacOS: Insights from Cybersecurity Experts
- CISA Alert: Medusa Ransomware Strikes Over 300 Critical Infrastructure Organizations
- Chinese Hackers Exploit Juniper Networks Routers with Custom Backdoors and Rootkits
- Unveiling the Truth Behind the DDoS Attacks That Crippled X
- The AI Arms Race: How Cybersecurity is Catching Up to AI-Driven Threats
- Unveiling Steganography: How XWorm Exploits Images for Cyber Attacks
- Advanced Persistent Threat: SideWinder Targets Maritime, Nuclear, and IT Sectors Across Asia, Middle East, and Africa
- Colombian Institutions Under Siege: Blind Eagle Exploits NTLM Flaw, RATs & GitHub Attacks
- Developer Convicted for Sabotaging Ex-Employer's Systems with Kill Switch
- Critical Zero-Day Flaw in Edimax IP Cameras Exploited by Mirai-Based Botnets
- Visual representation of the code in Dev Tools
- The creator of malware has infected her own computer
- Adrozek malware Ad-injecting hijacks
- How to enable DNS over HTTPS in Chrome
- Cloudflare Notification about increase in ransom DDoS threats
- How to lock the camera and microphone on laptop?
- WhatsApp voicemail scam
- Top 7 Biggest Data Breaches of the 21st Century
- There is a mass mailing of the Troldesh cipher virus on behalf of Russian companies
- The full MySQL dump of the hhide.org hacker forum database was freely available
- Structured Threat Intelligence Graph – new tool to protect the grid from cyber attacks
- Spammers use Google services
- Slack warns investors about possible cyber attacks
- OWASP mobile top 10 security risks explained with real world examples
- Over 50,000 Windows MS-SQL and PHPMyAdmin Servers Worldwide with 20 Different Payloads
- NEWS Backdoor spreads as a fake Chrome update
- China proposes replacing TCP / IP with New IP
- Android.Circle ad trojan and clicker has been installed more than 700,000 times
- Malwarebytes warns Mac threats are growing
- How To Configure Cloudflare To Maximize WordPress Speed + Security
- Google Calendar scam adds malicious links to your schedule
- GOLDBRUTE BOTNET attacks Windows-systems with active connection via RDP
- Echobot malware is a smorgasbord of vulnerabilities
- Applications with 1.5 million installations engaged in click fraud and discharged device batteries
- WordPress plugin can let hackers wipe up to 200,000 sites