Latest Threats

Cybergang Claims REvil is Back, Executes DDoS Attacks

Cybergang Claims REvil is Back, Executes DDoS Attacks

Actors claiming to be the defunct ransomware group are targeting one of Akami’s...

Verizon Report: Ransomware, Human Error Among Top Security Risks

Verizon Report: Ransomware, Human Error Among Top Security...

2022’s DBIR also highlighted the far-reaching impact of supply-chain breaches and...

Zoom Patches ‘Zero-Click’ RCE Bug

Zoom Patches ‘Zero-Click’ RCE Bug

The Google Project Zero researcher found a bug in XML parsing on the Zoom client...

Link Found Connecting Chaos, Onyx and Yashma Ransomware

Link Found Connecting Chaos, Onyx and Yashma Ransomware

A slip-up by a malware author has allowed researchers to taxonomize three ransomware...

Fronton IOT Botnet Packs Disinformation Punch

Fronton IOT Botnet Packs Disinformation Punch

Fronton botnet has far more ability than launching DDOS attack, can track social...

Snake Keylogger Spreads Through Malicious PDFs

Snake Keylogger Spreads Through Malicious PDFs

Microsoft Word also leveraged in the email campaign, which uses a 22-year-old Office...

Zero Trust for Data Helps Enterprises Detect, Respond and Recover from Breaches

Zero Trust for Data Helps Enterprises Detect, Respond and...

Mohit Tiwari, CEO of Symmetry Systems, explores Zero Trust, data objects and the...

380K Kubernetes API Servers Exposed to Public Internet

380K Kubernetes API Servers Exposed to Public Internet

More than 380,000 of the 450,000-plus servers hosting the open-source container-orchestration...

Closing the Gap Between Application Security and Observability

Closing the Gap Between Application Security and Observability

Daniel Kaar, global director application security engineering at Dynatrace, highlights...

Critical Vulnerability in Premium WordPress Themes Allows for Site Takeover

Critical Vulnerability in Premium WordPress Themes Allows...

Privilege escalation flaw discovered in the Jupiter and JupiterX Core Plugin affects...

April VMware Bugs Abused to Deliver Mirai Malware, Exploit Log4Shell

April VMware Bugs Abused to Deliver Mirai Malware, Exploit...

Researchers say a GitHub proof-of-concept exploitation of recently announced VMware...

APTs Overwhelmingly Share Known Vulnerabilities Rather Than Attack O-Days

APTs Overwhelmingly Share Known Vulnerabilities Rather...

Research indicates that organizations should make patching existing flaws a priority...

DOJ Says Doctor is Malware Mastermind

DOJ Says Doctor is Malware Mastermind

The U.S. Department of Justice indites middle-aged doctor, accusing him of being...

iPhones Vulnerable to Attack Even When Turned Off

iPhones Vulnerable to Attack Even When Turned Off

Wireless features Bluetooth, NFC and UWB stay on even when the device is powered...

Sysrv-K Botnet Targets Windows, Linux

Sysrv-K Botnet Targets Windows, Linux

Microsoft researchers say they are tracking a botnet that is leveraging bugs in...

Microsoft’s May Patch Tuesday Updates Cause Windows AD Authentication Errors

Microsoft’s May Patch Tuesday Updates Cause Windows AD...

Microsoft's May Patch Tuesday update is triggering authentication errors.

Intel Memory Bug Poses Risk for Hundreds of Products

Intel Memory Bug Poses Risk for Hundreds of Products

Dell and HP were among the first to release patches and fixes for the bug.

Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks

Novel ‘Nerbian’ Trojan Uses Advanced Anti-Detection Tricks

The stealthy, feature-rich malware has multistage evasion tactics to fly under the...

You Can’t Eliminate Cyberattacks, So Focus on Reducing the Blast Radius

You Can’t Eliminate Cyberattacks, So Focus on Reducing...

Tony Lauro, director of security technology and strategy at Akamai, discusses reducing...

Malware Builder Leverages Discord Webhooks

Malware Builder Leverages Discord Webhooks

Researchers discovered a simple malware builder designed to steal credentials, then...

Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service

Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service

An account promoting the project—which offers a range of threat activity from info-stealing...

Conti Ransomware Attack Spurs State of Emergency in Costa Rica

Conti Ransomware Attack Spurs State of Emergency in Costa...

The threat group has leaked data that it claims was stolen in the breach and is...

Hackers Actively Exploit F5 BIG-IP Bug

Hackers Actively Exploit F5 BIG-IP Bug

The bug has a severe rating of 9.8, public exploits are released.

FBI: Rise in Business Email-based Attacks is a $43B Headache

FBI: Rise in Business Email-based Attacks is a $43B Headache

A huge spike in fraudulent activities related to attacks leveraging business email...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here