Latest Threats

New Buer Malware Downloader Rewritten in E-Z Rust Language

New Buer Malware Downloader Rewritten in E-Z Rust Language

It's coming in emails disguised as DHL Support shipping notices and is apparently...

PortDoor Espionage Malware Takes Aim at Russian Defense Sector

PortDoor Espionage Malware Takes Aim at Russian Defense...

The stealthy backdoor is likely being used by Chinese APTs, researchers said.

WeSteal: A Cryptocurrency-Stealing Tool That Does Just That

WeSteal: A Cryptocurrency-Stealing Tool That Does Just...

The developer of the WeSteal cryptocurrency stealer can’t be bothered with fancy...

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange

A Tale of Two Hacks: From SolarWinds to Microsoft Exchange

Oliver Tavakoli, CTO of Vectra AI, discusses the differences between the massive...

Microsoft Warns of 25 Critical Vulnerabilities in IoT, Industrial Devices

Microsoft Warns of 25 Critical Vulnerabilities in IoT,...

Azure Defender security team discovers that memory allocation is a systemic problem...

Babuk Ransomware Gang Mulls Retirement

Babuk Ransomware Gang Mulls Retirement

The RaaS operators have been posting, tweaking and taking down a goodbye note, saying...

F5 Big-IP Vulnerable to Security-Bypass Bug

F5 Big-IP Vulnerable to Security-Bypass Bug

The KDC-spoofing flaw tracked as CVE-2021-23008 can be used to bypass Kerberos security...

Experian API Leaks Most Americans’ Credit Scores

Experian API Leaks Most Americans’ Credit Scores

Researchers fear wider exposure, amidst a tepid response from Experian.

Multi-Gov Task Force Plans to Take Down the Ransomware Economy

Multi-Gov Task Force Plans to Take Down the Ransomware...

A coalition of 60 global entities (including the DoJ) has proposed a sweeping plan...

COVID-19 Results for 25% of Wyoming Accidentally Posted Online

COVID-19 Results for 25% of Wyoming Accidentally Posted...

Sorry, we’ve upchucked your COVID test results and other medical and personal data...

Nintendo Sues Video-Game Pirates

Nintendo Sues Video-Game Pirates

Nintendo is questing after its third successful lawsuit against circumvention-device...

Linux Kernel Bug Opens Door to Wider Cyberattacks

Linux Kernel Bug Opens Door to Wider Cyberattacks

The information-disclosure flaw allows KASLR bypass and the discovery of additional,...

Smishing: Why Text-Based Phishing Should Be on Every CISO’s Radar

Smishing: Why Text-Based Phishing Should Be on Every CISO’s...

Phil Richards, Chief Security Officer at Ivanti, discusses dramatic growth in smishing...

Babuk Ransomware Gang Targets Washington DC Police

Babuk Ransomware Gang Targets Washington DC Police

The RaaS developers thumbed their noses at police, saying “We find 0 day before...

Apple Patches Zero-Day MacOS Bug That Can Bypass Anti-Malware Defenses

Apple Patches Zero-Day MacOS Bug That Can Bypass Anti-Malware...

A variant of Mac No. 1 threat Shlayer since January already has been exploiting...

Flubot Spyware Spreading Through Android Devices

Flubot Spyware Spreading Through Android Devices

The malware is spreading rapidly through ‘missed package delivery’ SMS texts, prompting...

Nvidia Warns: Severe Security Bugs in GPU Driver, vGPU Software

Nvidia Warns: Severe Security Bugs in GPU Driver, vGPU...

The gaming- and AI-friendly graphics accelerators can open the door to a range of...

Mount Locker Ransomware Aggressively Changes Up Tactics

Mount Locker Ransomware Aggressively Changes Up Tactics

The ransomware is upping its danger quotient with new features while signaling a...

Spotlight on Cybercriminal Supply Chains

Spotlight on Cybercriminal Supply Chains

In this Threatpost podcast Fortinet’s top researcher outlines what a cybercriminal...

Telegram Platform Abused in ‘ToxicEye’ Malware Campaigns

Telegram Platform Abused in ‘ToxicEye’ Malware Campaigns

Even if the app is not installed or in use, threat actors can use it to spread malware...

It’s Easy to Become a Cyberattack Target, but a VPN Can Help

It’s Easy to Become a Cyberattack Target, but a VPN Can...

You might think that cybercrime is more prevalent in less digitally literate countries....

Security Bug Allows Attackers to Brick Kubernetes Clusters

Security Bug Allows Attackers to Brick Kubernetes Clusters

The vulnerability is triggered when a cloud container pulls a malicious image from...

Ransomware Attack Creates Cheese Shortages in Netherlands

Ransomware Attack Creates Cheese Shortages in Netherlands

Not a Gouda situation: An attack on a logistics firm is suspected to be related...

FBI Clears ProxyLogon Web Shells from Hundreds of Orgs

FBI Clears ProxyLogon Web Shells from Hundreds of Orgs

In a veritable cyber-SWAT action, the Feds remotely removed the infections without...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here