Latest Threats

Nvidia Warns: Severe Security Bugs in GPU Driver, vGPU Software

Nvidia Warns: Severe Security Bugs in GPU Driver, vGPU...

The gaming- and AI-friendly graphics accelerators can open the door to a range of...

Mount Locker Ransomware Aggressively Changes Up Tactics

Mount Locker Ransomware Aggressively Changes Up Tactics

The ransomware is upping its danger quotient with new features while signaling a...

Spotlight on Cybercriminal Supply Chains

Spotlight on Cybercriminal Supply Chains

In this Threatpost podcast Fortinet’s top researcher outlines what a cybercriminal...

Telegram Platform Abused in ‘ToxicEye’ Malware Campaigns

Telegram Platform Abused in ‘ToxicEye’ Malware Campaigns

Even if the app is not installed or in use, threat actors can use it to spread malware...

It’s Easy to Become a Cyberattack Target, but a VPN Can Help

It’s Easy to Become a Cyberattack Target, but a VPN Can...

You might think that cybercrime is more prevalent in less digitally literate countries....

Security Bug Allows Attackers to Brick Kubernetes Clusters

Security Bug Allows Attackers to Brick Kubernetes Clusters

The vulnerability is triggered when a cloud container pulls a malicious image from...

Ransomware Attack Creates Cheese Shortages in Netherlands

Ransomware Attack Creates Cheese Shortages in Netherlands

Not a Gouda situation: An attack on a logistics firm is suspected to be related...

FBI Clears ProxyLogon Web Shells from Hundreds of Orgs

FBI Clears ProxyLogon Web Shells from Hundreds of Orgs

In a veritable cyber-SWAT action, the Feds remotely removed the infections without...

A Post-Data Privacy World and Data-Rights Management

A Post-Data Privacy World and Data-Rights Management

Joseph Carson, chief security scientist at Thycotic, discusses the death of data...

100,000 Google Sites Used to Install SolarMarket RAT

100,000 Google Sites Used to Install SolarMarket RAT

Search-engine optimization (SEO) tactics direct users searching for common business...

How the NAME:WRECK Bugs Impact Consumers, Businesses

How the NAME:WRECK Bugs Impact Consumers, Businesses

How this class of vulnerabilities will impact millions connected devices and potentially...

COVID-Related Threats, PowerShell Attacks Lead Malware Surge

COVID-Related Threats, PowerShell Attacks Lead Malware...

Researchers measured 648 new malware threats every minute during Q4 2020.  

Tax Phish Swims Past Google Workspace Email Security

Tax Phish Swims Past Google Workspace Email Security

Crooks are looking to harvest email credentials with a savvy campaign that uses...

Adobe Patches Slew of Critical Security Bugs in Bridge, Photoshop

Adobe Patches Slew of Critical Security Bugs in Bridge,...

The security bugs could open the door for arbitrary code-execution and full takeover...

Chrome Zero-Day Exploit Posted on Twitter

Chrome Zero-Day Exploit Posted on Twitter

An update to Google’s browser that fixes the flaw is expected to be released on...

1.3M Clubhouse Users’ Data Dumped in Hacker Forum for Free

1.3M Clubhouse Users’ Data Dumped in Hacker Forum for Free

Clubhouse denies it was ‘breached’ and says the data is out there for anyone to...

Man Arrested for AWS Bomb Plot

Man Arrested for AWS Bomb Plot

A man caught in an FBI sting allegedly said he wanted to destroy "70 percent of...

Zero Trust: The Mobile Dimension

Zero Trust: The Mobile Dimension

Hank Schless, senior security solutions manager at Lookout, discusses how to secure...

IcedID Circulates Via Web Forms, Google URLs

IcedID Circulates Via Web Forms, Google URLs

Attackers are filling out and submitting web-based "contact us" forms, thus evading...

DOJ: Creep Coach Finagles Nude Athlete Photos

DOJ: Creep Coach Finagles Nude Athlete Photos

Allegedly perv college coach charged with cyberstalking and extorting nudes from...

623M Payment Cards Stolen from Cybercrime Forum

623M Payment Cards Stolen from Cybercrime Forum

The database was subsequently leaked elsewhere, imperiling consumers from the U.S....

Network Detection & Response: The Next Frontier in Fighting the Human Problem

Network Detection & Response: The Next Frontier in Fighting...

Justin Jett, director of audit and compliance for Plixer, discusses the transformation...

Data from 500M LinkedIn Users Posted for Sale Online

Data from 500M LinkedIn Users Posted for Sale Online

Like the Facebook incident earlier this week, the information — including user profile...

Adware Spreads via Fake TikTok App, Laptop Offers

Adware Spreads via Fake TikTok App, Laptop Offers

Cybercriminals are encouraging users to send the "offers" via WhatsApp to their...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here