Latest Threats

New Twists on Gift-Card Scams Flourish on Black Friday

New Twists on Gift-Card Scams Flourish on Black Friday

Fake merchandise and crypto jacking are among the new ways cybercriminals will try...

Attackers Actively Target Windows Installer Zero-Day

Attackers Actively Target Windows Installer Zero-Day

Researcher discovered a “more powerful” variant of an elevation-of-privilege flaw...

Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker

Apple’s NSO Group Lawsuit Amps Up Pressure on Pegasus Spyware-Maker

Just weeks after a judge ruled that NSO Group did not have immunity in a suit brought...

GoDaddy Breach Widens to Include Reseller Subsidiaries

GoDaddy Breach Widens to Include Reseller Subsidiaries

Customers of several brands that resell GoDaddy Managed WordPress have also been...

9.3M+ Androids Running ‘Malicious’ Games from Huawei AppGallery

9.3M+ Androids Running ‘Malicious’ Games from Huawei AppGallery

A new trojan called Android.Cynos.7.origin, designed to collect Android users’ device...

Common Cloud Misconfigurations Exploited in Minutes, Report

Common Cloud Misconfigurations Exploited in Minutes, Report

Opportunistic attackers instantly exploited insecurely exposed services deployed...

Attackers Will Flock to Crypto Wallets, Linux in 2022:  Podcast

Attackers Will Flock to Crypto Wallets, Linux in 2022:...

That’s just the start of what cyberattackers will zero in on as they pick up APT...

Imunify360 Bug Leaves Linux Web Servers Open to Code Execution, Takeover

Imunify360 Bug Leaves Linux Web Servers Open to Code Execution,...

CloudLinux's security platform for Linux-based websites and web servers contains...

Attackers Hijack Email Threads Using ProxyLogon/ProxyShell Flaws

Attackers Hijack Email Threads Using ProxyLogon/ProxyShell...

Exploiting Microsoft Exchange ProxyLogon & ProxyShell vulnerabilities, attackers...

Online Merchants: Prevent Fraudsters from Becoming Holiday Grinches

Online Merchants: Prevent Fraudsters from Becoming Holiday...

Black Friday and Cyber Monday approach! Saryu Nayyar, CEO at Gurucul, discusses...

GoDaddy’s Latest Breach Affects 1.2M Customers

GoDaddy’s Latest Breach Affects 1.2M Customers

The kingpin domain registrar has logged its fifth cyber-incident since 2018, after...

California Pizza Kitchen Serves Up Employee SSNs in Data Breach

California Pizza Kitchen Serves Up Employee SSNs in Data...

A hefty slice of data – that of 100K+ current and former employees – was spilled...

6M Sky Routers Left Exposed to Attack for Nearly 1.5 Years

6M Sky Routers Left Exposed to Attack for Nearly 1.5 Years

Pen Test Partners didn't disclose the vulnerability after 90 days because it knew...

Iranians Charged in Cyberattacks Against U.S. 2020 Election

Iranians Charged in Cyberattacks Against U.S. 2020 Election

The State Department has offered a $10M reward for tips on the two Iran-based threat...

How to Choose the Right DDoS Protection Solution

How to Choose the Right DDoS Protection Solution

Pankaj Gupta, Senior Director at Citrix, outlines how distributed denial of service...

Spear-Phishing Campaign Exploits Glitch Platform to Steal Credentials

Spear-Phishing Campaign Exploits Glitch Platform to Steal...

Threat actors are targeting Middle-East-based employees of major corporations in...

FBI: FatPipe VPN Zero-Day Exploited by APT for 6 Months

FBI: FatPipe VPN Zero-Day Exploited by APT for 6 Months

The bureau's flash alert said an APT has been exploiting the flaw to compromise...

3 Top Tools for Defending Against Phishing Attacks

3 Top Tools for Defending Against Phishing Attacks

Phishing emails are now skating past traditional defenses. Justin Jett, director...

Ransomware Phishing Emails Sneak Through SEGs

Ransomware Phishing Emails Sneak Through SEGs

The MICROP ransomware spreads via Google Drive and locally stored passwords.

Phishing Scam Aims to Hijack TikTok ‘Influencer’ Accounts

Phishing Scam Aims to Hijack TikTok ‘Influencer’ Accounts

Threat actors used malicious emails to target more than 125 people with high-profile...

Exchange, Fortinet Flaws Being Exploited by Iranian APT, CISA Warns

Exchange, Fortinet Flaws Being Exploited by Iranian APT,...

Meanwhile, a Microsoft analysis that followed six Iranian threat actor groups for...

Netflix Bait: Phishers Target Streamers with Fake Service Signups

Netflix Bait: Phishers Target Streamers with Fake Service...

Lures dressed up to look like movie and TV streaming offers are swiping payment...

Fake Ransomware Infection Hits WordPress Sites

Fake Ransomware Infection Hits WordPress Sites

WordPress sites have been splashed with ransomware warnings that are as real as...

Emotet Resurfaces on the Back of TrickBot After Nearly a Year

Emotet Resurfaces on the Back of TrickBot After Nearly...

Researchers observed what looks like the Emotet botnet – the "world’s most dangerous...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here