Latest Threats

Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers

Zero-Day Bug Impacts Problem-Plagued Cisco SOHO Routers

Cisco says it will not patch three small business router models and one VPN firewall...

IcedID Banking Trojan Surges: The New Emotet?

IcedID Banking Trojan Surges: The New Emotet?

A widespread email campaign using malicious Microsoft Excel attachments and Excel...

Azure Functions Weakness Allows Privilege Escalation

Azure Functions Weakness Allows Privilege Escalation

Microsoft's cloud-container technology allows attackers to directly write to files,...

Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware Attacks

Hackers Exploit Fortinet Flaw in Sophisticated Cring Ransomware...

Industrial enterprises in Europe are target of campaign, which forced a shutdown...

Attackers Blowing Up Discord, Slack with Malware  

Attackers Blowing Up Discord, Slack with Malware  

One Discord network search turned up 20,000 virus results, researchers found.  

Crossing the Line: When Cyberattacks Become Acts of War

Crossing the Line: When Cyberattacks Become Acts of War

Saryu Nayyar, CEO at Gurucul, discusses the new Cold War and the potential for a...

Fake Netflix App on Google Play Spreads Malware Via WhatsApp

Fake Netflix App on Google Play Spreads Malware Via WhatsApp

The wormable malware spread from Android to Android by sending messages offering...

Facebook: Stolen Data Scraped from Platform in 2019

Facebook: Stolen Data Scraped from Platform in 2019

The flaw that caused the leak of personal data of more than 533 million users over...

Critical Cloud Bug in VMWare Carbon Black Allows Takeover

Critical Cloud Bug in VMWare Carbon Black Allows Takeover

CVE-2021-21982 affects a platform designed to secure private clouds, and the virtual...

SAP Bugs Under Active Cyberattack, Causing Widespread Compromise

SAP Bugs Under Active Cyberattack, Causing Widespread Compromise

Cyberattackers are actively exploiting known security vulnerabilities in widely...

Conti Gang Demands $40M Ransom from Florida School District

Conti Gang Demands $40M Ransom from Florida School District

New details of negotiation between attackers and officials from Broward County Public...

Apple, Google Both Track Mobile Telemetry Data, Despite Users Opting Out

Apple, Google Both Track Mobile Telemetry Data, Despite...

Google’s Pixel and Apple’s iPhone both in privacy hot seat for siphoning mobile...

Fraud Ring Launders Money Via Fake Charity Donations

Fraud Ring Launders Money Via Fake Charity Donations

The Cart Crasher gang is testing stolen payment cards while cleaning ill-gotten...

bg
Group-IB : payment data of thousands of customers of UK and US online stores could have been compromised

Group-IB : payment data of thousands of customers of UK...

Moscow, 14.03.2019 – Group-IB, an international company that specializes in preventing...

bg
Website of Chelyabinsk court hits by data-encrypting malware

Website of Chelyabinsk court hits by data-encrypting malware

Attackers hacked into the website of Arbitration court of Chelyabinsk( a federal...

bg
Ukrainian Hacker detained for remotely spying on Politicians

Ukrainian Hacker detained for remotely spying on Politicians

A 23 year old Ukrainian Hacker from Kharkiv City detained by the National Police...

Child Tweets Gibberish from U.S. Nuke Account

Child Tweets Gibberish from U.S. Nuke Account

Telecommuting social-media manager for the U.S. Strategic Command left the laptop...

APT Charming Kitten Pounces on Medical Researchers

APT Charming Kitten Pounces on Medical Researchers

Researchers uncover a credential-stealing campaign targeting genetic, neurology...

Ziggy Ransomware Gang Offers Refunds to Victims

Ziggy Ransomware Gang Offers Refunds to Victims

Ziggy joins Fonix ransomware group and shuts down, with apologies to targets.

bg
Putin signed a law to Protect Critical Information Infrastructure from Cyberattacks

Putin signed a law to Protect Critical Information Infrastructure...

On 27 July the President of Russia Vladimir Putin signed a new Law on the Cyber...

bg
Russian Hacker pleads guilty for role in creating Ebury Malware

Russian Hacker pleads guilty for role in creating Ebury...

The Russians hackers who created the malware Ebury pleaded guilty to the charges...

Malicious Docker Cryptomining Images Rack Up 20M Downloads

Malicious Docker Cryptomining Images Rack Up 20M Downloads

Publicly available cloud images are spreading Monero-mining malware to unsuspecting...

SolarWinds Attackers Accessed DHS Emails, Report

SolarWinds Attackers Accessed DHS Emails, Report

Current and former administration sources say the nation-state attackers were able...

Intel Sued Under Wiretapping Laws for Tracking User Activity on its Website

Intel Sued Under Wiretapping Laws for Tracking User Activity...

A class-action suit in Florida accuses the tech giant of unlawfully intercepting...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here