Cybersecurity News | QUICK READ
WordPress Websites Files and Databases Injected with Malicious JavaScript
The Malicious Campaign Allowed the Attacker the Ability to Redirect the Website Users to a Location of Their Choosing.
Cybersecurity News | QUICK READ
South Asian Governments Targeted by Bitter APT Group
Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.
Cybersecurity News | QUICK READ
Nerbian RAT Malware, New Threat on the Market
The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.
Cybersecurity News | INTERMEDIATE READ
Hackers Are Going After Managed Security Providers
According to the FBI, CISA, and the NSA, Supply Chain Attacks Are Becoming More Common.
Cybersecurity News | QUICK READ
New Phishing-as-a-Service Toolkit Discovered
Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.
Cybersecurity News | QUICK READ
Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks
Global Cyberattacks Have Grown Following Hacker’s Exploitation of a Print Spooler Bug.
Cybersecurity News | QUICK READ
Don’t Underestimate the DCRat Malware!
Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.
Cybersecurity News | QUICK READ
Critical F5 BIG-IP Vulnerability Exploited by Hackers
Several F5 BIG-IP Modules Are Impacted.
Cybersecurity News | QUICK READ
Lincoln College to Close Following Ransomware Attack
The Institution Will Suspend All Academic Activities at the Conclusion of the Spring Semester.
Cybersecurity News | QUICK READ
National Emergency Declared by Costa Rica Following Conti Cyberattacks
Conti’s Operations Go On!
Cybersecurity News | QUICK READ
Information Leading to the Arrest of Conti Ransomware Co-Conspirators to be Rewarded
The US Department of State Will Pay up to $10 Million for Information on Key Members of the Infamous Conti Cybercrime Gang.
Cybersecurity News | QUICK READ
Caramel Credit Card Theft Is Becoming Increasingly Popular
Beware of Financial Fraud!
Cybersecurity News | QUICK READ
NIST Releases Advisory Guide on Supply Chain Attack Protection
NIST’s New Recommendations on Supply Chain Attack Prevention
Cybersecurity News | QUICK READ
Windows Installer Used by New Raspberry Robin Worm
The Worm Creates a New Process that Uses cmd.exe to Run Malicious Files.
Cybersecurity News | QUICK READ
Chinese State-Sponsored APT Naikon Resurfaces with New Tactics, Techniques, and Procedures (TTPs).
Naikon M.O. and TTPs
Cybersecurity News | QUICK READ
UK National Health Service Email Accounts Compromised by Hackers to Steal Microsoft Logins
Over 1000 Malicious Emails Have Been Sent from NHS Employees Email Accounts.
Cybersecurity News | QUICK READ
BIG-IP RCE Bug Could Allow Device Takeover
Unauthenticated Attackers with Network Access Might Execute Arbitrary System Commands, Modify Files, and Disable Services on BIG-IP.
Cybersecurity News | QUICK READ
Watch Out! Verified Twitter Accounts Are Targeted in Phishing Attacks
In these Phishing Emails Users Are Informed that Ignoring the Message Could Result in Account Suspension.
Cybersecurity News | QUICK READ
Transport for NSW Suffers Cyber Incident
Its Online Authorised Inspection Scheme Application Was Accessed by an Unauthorised Third Party.
Cybersecurity News | QUICK READ
Hacking Group Moshen Dragon Targets Asian Telecommunication Companies
The Infection Vector Used By the Malicious Actors Remains Unknown at this Time.
Cybersecurity News | QUICK READ
Threat Actors Sent Malicious Emails Using Google SMTP Relay Service
In the First Two Weeks of April, Approximately 30,000 Emails Were Sent Using this Technique.
Cybersecurity News | QUICK READ
REvil Ransomware Makes a Comeback
The Ransomware Operation Has Emerged with a New Infrastructure and a Modified Encryptor.
Cybersecurity News | QUICK READ
Mental Health and Prayer Apps Do Not Meet Mozilla's Minimum Security Standards
User Security and Privacy Not a Priority for these Types of Apps.
Cybersecurity News | QUICK READ
Conti’s BazarLoader Replaced with Bumblebee Malware
Similar in Techniques with BazarLoader and IcedID, Bumblebee Is Distributed in Phishing Campaigns.
Cybersecurity News | QUICK READ
EmoCheck Tool 2.2 Supports and Detects New 64-bit Variants of Emotet Malware
How to Verify if You Are Infected with Emotet Trojan.
Cybersecurity News | QUICK READ
Medical Software Company Fined €1.5M for Exposing 490k Patients' Data
Dedalus Biology Was Fined by the French Data Protection Regulator (CNIL).
Cybersecurity News | QUICK READ
The Tenet Case: Are Hackers Targeting the Healthcare Industry?
How Healthcare Can Stay Safe in this Cybersecurity Landscape.
Cybersecurity News | QUICK READ
Top Exploited Vulnerabilities in 2021 Revealed by Cybersecurity Firms
15 Common Flaws of Last Year Now Put Together in a List.
Cybersecurity News | QUICK READ
The Nimbuspwn Linux Flaw Allows Root Access
Local Attackers Could Use Nimbuspwn to Escalate Privileges on Linux Systems.
Cybersecurity News | QUICK READ
Coca-Cola Investigates Hacker Data Theft Allegations
The Stormous Gang Claimed to Have Hacked into the Company’s Servers.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats