Latest Threats

Monumental Supply-Chain Attack on Airlines Traced to State Actor

Monumental Supply-Chain Attack on Airlines Traced to State...

Airlines are warned to scour networks for traces of the campaign, likely the work...

Cyberpunk 2077 Hacked Data Circulating Online

Cyberpunk 2077 Hacked Data Circulating Online

CD Projekt Red confirmed that employee and game-related data appears to be floating...

REvil Hits US Nuclear Weapons Contractor: Report

REvil Hits US Nuclear Weapons Contractor: Report

"We hereby keep a right (sic) to forward all of the relevant documentation and data...

Baby Clothes Giant Carter’s Leaks 410K Customer Records

Baby Clothes Giant Carter’s Leaks 410K Customer Records

Purchase automation software delivered shortened URLs without protections.

Unpatched Bugs Found Lurking in Provisioning Platform Used with Cisco UC

Unpatched Bugs Found Lurking in Provisioning Platform Used...

A trio of security flaws open the door to remote-code execution and a malware tsunami.

Steam Gaming Platform Hosting Malware

Steam Gaming Platform Hosting Malware

Emerging malware is lurking in Steam profile images.

Microsoft: Big Cryptomining Attacks Hit Kubeflow

Microsoft: Big Cryptomining Attacks Hit Kubeflow

Misconfigured dashboards are yet again at the heart of a widespread, ongoing cryptocurrency...

STEM Audio Table Rife with Business-Threatening Bugs

STEM Audio Table Rife with Business-Threatening Bugs

The desktop conferencing IoT gadget allows remote attackers to install all kinds...

Chrome Browser Bug Under Active Attack

Chrome Browser Bug Under Active Attack

Google has patched its Chrome browser, fixing one critical cache issue and a second...

‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts

‘Fancy Lazarus’ Cyberattackers Ramp up Ransom DDoS Efforts

The group, known for masquerading as various APT groups, is back with a spate of...

Microsoft Patch Tuesday Fixes 6 In-The-Wild Exploits, 50 Flaws

Microsoft Patch Tuesday Fixes 6 In-The-Wild Exploits, 50...

Researchers discovered a highly targeted malware campaign launched in April, in...

DarkSide Pwned Colonial With Old VPN Password

DarkSide Pwned Colonial With Old VPN Password

Attackers accessed a VPN account that was no longer in use to freeze the company’s...

Intel Plugs 29 Holes in CPUs, Bluetooth, Security

Intel Plugs 29 Holes in CPUs, Bluetooth, Security

The higher-rated advisories focus on privilege-escalation bugs in CPU firmware:...

Mysterious Custom Malware Collects Billions of Stolen Data Points

Mysterious Custom Malware Collects Billions of Stolen Data...

A nameless malware resulted in a huge data heist of files, credentials, cookies...

Billions of Compromised Records and Counting: Why the Application Layer is Still the Front Door for Data Breaches

Billions of Compromised Records and Counting: Why the Application...

Security teams should brace for an unsettling and unprecedented year, as we’re on...

‘An0m’ Encrypted-Chat Sting Leads to Arrest of 800

‘An0m’ Encrypted-Chat Sting Leads to Arrest of 800

The FBI and Australian law enforcement set up the encrypted chat service and ran...

Google Patches Critical Android RCE Bug

Google Patches Critical Android RCE Bug

Google's June security bulletin addresses 90+ bugs in Android and Pixel devices.

TrickBot Coder Faces Decades in Prison

TrickBot Coder Faces Decades in Prison

A Latvian malware developer known as "Max" has been arraigned on 19 counts related...

Lewd Phishing Lures Aimed at Business Explode

Lewd Phishing Lures Aimed at Business Explode

Socially engineered BEC attacks using X-rated material spike 974 percent.

Windows Container Malware Targets Kubernetes Clusters

Windows Container Malware Targets Kubernetes Clusters

“Siloscape”, the first malware to target Windows containers, breaks out of Kubernetes...

Novel ‘Victory’ Backdoor Spotted in Chinese APT Campaign

Novel ‘Victory’ Backdoor Spotted in Chinese APT Campaign

Researchers said the malware has been under development for at least three years.

Bad Apple: App Store Rife with Fraud, Fleeceware

Bad Apple: App Store Rife with Fraud, Fleeceware

Malicious apps make up 2 percent of top grossing apps in Apple App Store.

FBI Claws Back Millions of DarkSide’s Ransom Profits

FBI Claws Back Millions of DarkSide’s Ransom Profits

The tables have been turned, the FBI & DOJ said after announcing the use of blockchain...

Google PPC Ads Used to Deliver Infostealers

Google PPC Ads Used to Deliver Infostealers

The crooks pay top dollar for Google search results for the popular AnyDesk, Dropbox...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here