Latest Threats

DOJ: Creep Coach Finagles Nude Athlete Photos

DOJ: Creep Coach Finagles Nude Athlete Photos

Allegedly perv college coach charged with cyberstalking and extorting nudes from...

623M Payment Cards Stolen from Cybercrime Forum

623M Payment Cards Stolen from Cybercrime Forum

The database was subsequently leaked elsewhere, imperiling consumers from the U.S....

Network Detection & Response: The Next Frontier in Fighting the Human Problem

Network Detection & Response: The Next Frontier in Fighting...

Justin Jett, director of audit and compliance for Plixer, discusses the transformation...

Data from 500M LinkedIn Users Posted for Sale Online

Data from 500M LinkedIn Users Posted for Sale Online

Like the Facebook incident earlier this week, the information — including user profile...

Adware Spreads via Fake TikTok App, Laptop Offers

Adware Spreads via Fake TikTok App, Laptop Offers

Cybercriminals are encouraging users to send the "offers" via WhatsApp to their...

Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers

Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers

Cisco says it will not patch three small business router models and one VPN firewall...

IcedID Banking Trojan Surges: The New Emotet?

IcedID Banking Trojan Surges: The New Emotet?

A widespread email campaign using malicious Microsoft Excel attachments and Excel...

Azure Functions Weakness Allows Privilege Escalation

Azure Functions Weakness Allows Privilege Escalation

Microsoft's cloud-container technology allows attackers to directly write to files,...

Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks

Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware...

Industrial enterprises in Europe are target of campaign, which forced a shutdown...

Attackers Blowing Up Discord, Slack with Malware  

Attackers Blowing Up Discord, Slack with Malware  

One Discord network search turned up 20,000 virus results, researchers found.  

Crossing the Line: When Cyberattacks Become Acts of War

Crossing the Line: When Cyberattacks Become Acts of War

Saryu Nayyar, CEO at Gurucul, discusses the new Cold War and the potential for a...

Fake Netflix App on Google Play Spreads Malware Via WhatsApp

Fake Netflix App on Google Play Spreads Malware Via WhatsApp

The wormable malware spread from Android to Android by sending messages offering...

Facebook: Stolen Data Scraped from Platform in 2019

Facebook: Stolen Data Scraped from Platform in 2019

The flaw that caused the leak of personal data of more than 533 million users over...

Critical Cloud Bug in VMWare Carbon Black Allows Takeover

Critical Cloud Bug in VMWare Carbon Black Allows Takeover

CVE-2021-21982 affects a platform designed to secure private clouds, and the virtual...

bg
Group-IB : payment data of thousands of customers of UK and US online stores could have been compromised

Group-IB : payment data of thousands of customers of UK...

Moscow, 14.03.2019 – Group-IB, an international company that specializes in preventing...

bg
Website of Chelyabinsk court hits by data-encrypting malware

Website of Chelyabinsk court hits by data-encrypting malware

Attackers hacked into the website of Arbitration court of Chelyabinsk( a federal...

SAP Bugs Under Active Cyberattack, Causing Widespread Compromise

SAP Bugs Under Active Cyberattack, Causing Widespread Compromise

Cyberattackers are actively exploiting known security vulnerabilities in widely...

Conti Gang Demands $40M Ransom from Florida School District

Conti Gang Demands $40M Ransom from Florida School District

New details of negotiation between attackers and officials from Broward County Public...

Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out

Apple, Google Both Track Mobile Telemetry Data, Despite...

Google’s Pixel and Apple’s iPhone both in privacy hot seat for siphoning mobile...

Fraud Ring Launders Money Via Fake Charity Donations

Fraud Ring Launders Money Via Fake Charity Donations

The Cart Crasher gang is testing stolen payment cards while cleaning ill-gotten...

bg
Ukrainian Hacker detained for remotely spying on Politicians

Ukrainian Hacker detained for remotely spying on Politicians

A 23 year old Ukrainian Hacker from Kharkiv City detained by the National Police...

bg
Putin signed a law to Protect Critical Information Infrastructure from Cyberattacks

Putin signed a law to Protect Critical Information Infrastructure...

On 27 July the President of Russia Vladimir Putin signed a new Law on the Cyber...

bg
Russian Hacker pleads guilty for role in creating Ebury Malware

Russian Hacker pleads guilty for role in creating Ebury...

The Russians hackers who created the malware Ebury pleaded guilty to the charges...

Child Tweets Gibberish from U.S. Nuke Account

Child Tweets Gibberish from U.S. Nuke Account

Telecommuting social-media manager for the U.S. Strategic Command left the laptop...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here