BlackCat Ransomware Group Target Microsoft Azure Cloud Accounts
In a recent attack, the cyber security company Sophos X-Ops found a new version of malicious software called Sphynx. This upgraded version, Sphynx, has some new features…
In a recent attack, the cyber security company Sophos X-Ops found a new version of malicious software called Sphynx. This upgraded version, Sphynx, has some new features…
Malware loaders are rising as a cyber security threat, with new and dangerous variations emerging constantly. While the technical details may be complex, the public…
Ransomware attacks used to involve cybercriminals using encryption to lock up a company’s data, computer systems and technological infrastructure. But lately, these ransomware groups have…
A new iteration of the Rilide Stealer has surfaced, focusing its efforts on web browsers such as Google Chrome, Microsoft Edge, Brave, and Opera. Its…
Downfall CPU Attacks, a breed of cyber threats, have cast a spotlight on a significant vulnerability inherent in numerous contemporary computer processors, widely employed in…
Cyber security researchers at Palo Alto Unit 42 have discovered a new Python version of the NodeStealer that can take over Facebook Business Accounts.Based on…
The widely used WordPress form-building plugin, Ninja Forms, has been found to harbour three vulnerabilities. These security flaws could enable attackers to perform privilege escalation…
Ivanti released a patch for a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core. The vulnerability, CVE-2023-35078, allows unauthorised access to potentially…
Description Card testing attacks, also known as card checking attacks, are a form of fraud where criminals try to determine if stolen credit card information…