News&Articles

Mimecast: SolarWinds Attackers Stole Source Code

Mimecast: SolarWinds Attackers Stole Source Code

A new Mimecast update reveals the SolarWinds hackers accessed several "limited"...

$4,000 COVID-19 ‘Relief Checks’ Cloak Dridex Malware

$4,000 COVID-19 ‘Relief Checks’ Cloak Dridex Malware

The American Rescue Act is the latest zeitgeisty lure being circulated in an email...

Top MSP Challenges in 2021

Top MSP Challenges in 2021

At SafeDNS, we see three entangled hurdles for MSPs in 2021 and the coming years—...

Google Releases Spectre PoC Exploit For Chrome

Google Releases Spectre PoC Exploit For Chrome

Google has released the side-channel exploit in hopes of motivating web-application...

Magecart Attackers Save Stolen Credit-Card Data in .JPG File

Magecart Attackers Save Stolen Credit-Card Data in .JPG...

Researchers from Sucuri discovered the tactic, which creatively hides malicious...

Exchange Cyberattacks Escalate as Microsoft Rolls One-Click Fix

Exchange Cyberattacks Escalate as Microsoft Rolls One-Click...

Public proof-of-concept (PoC) exploits for ProxyLogon could be fanning a feeding...

Latest Mirai Variant Targets SonicWall, D-Link and IoT Devices

Latest Mirai Variant Targets SonicWall, D-Link and IoT...

A new Mirai variant is targeting known flaws in D-Link, Netgear and SonicWall devices,...

Google Warns Mac, Windows Users of Chrome Zero-Day Flaw

Google Warns Mac, Windows Users of Chrome Zero-Day Flaw

The use-after-free vulnerability is the third Google Chrome zero-day flaw to be...

Cyberattacks See Fundamental Changes, A Year into COVID-19

Cyberattacks See Fundamental Changes, A Year into COVID-19

A year after COVID-19 was officially determined to be a pandemic, the methods and...

Microsoft Exchange Exploits Pave a Ransomware Path

Microsoft Exchange Exploits Pave a Ransomware Path

As attacks double every hour, hackers are exploiting vulnerable Microsoft Exchange...

Metamorfo Banking Trojan Abuses AutoHotKey to Avoid Detection

Metamorfo Banking Trojan Abuses AutoHotKey to Avoid Detection

A legitimate binary for creating shortcut keys in Windows is being used to help...

Europol Credits Sweeping Arrests to Cracked Sky ECC Comms  

Europol Credits Sweeping Arrests to Cracked Sky ECC Comms...

Sky ECC claims that cops cracked a fake version of the app being passed off by disgruntled...

REvil Group Claims Slew of Ransomware Attacks

REvil Group Claims Slew of Ransomware Attacks

The threat group behind the Sodinokibi ransomware claimed to have recently compromised...

Critical Security Hole Can Knock Smart Meters Offline

Critical Security Hole Can Knock Smart Meters Offline

Unpatched Schneider Electric PowerLogic ION/PM smart meters are open to dangerous...

F5, CISA Warn of Critical BIG-IP and BIG-IQ RCE Bugs

F5, CISA Warn of Critical BIG-IP and BIG-IQ RCE Bugs

The F5 flaws could affect the networking infrastructure for some of the largest...

FIN8 Resurfaces with Revamped Backdoor Malware

FIN8 Resurfaces with Revamped Backdoor Malware

The financial cyber-gang is running limited attacks ahead of broader offensives...

Linux Systems Under Attack By New RedXOR Malware

Linux Systems Under Attack By New RedXOR Malware

Researchers say the new RedXOR backdoor is targeting Linux systems with various...

Microsoft Exchange Servers Face APT Attack Tsunami

Microsoft Exchange Servers Face APT Attack Tsunami

At least 10 nation-state-backed groups are using the ProxyLogon exploit chain to...

NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic

NanoCore RAT Scurries Past Email Defenses with .ZIPX Tactic

A spam campaign hides a malicious executable behind file archive extensions.

Microsoft Patch Tuesday Updates Fix 14 Critical Bugs

Microsoft Patch Tuesday Updates Fix 14 Critical Bugs

Microsoft's regularly scheduled March Patch Tuesday updates address 89 CVEs overall.

Apple’s Device Location-Tracking System Could Expose User Identities

Apple’s Device Location-Tracking System Could Expose User...

Researchers have identified two vulnerabilities in the company’s crowd-sourced Offline...

Breach Exposes Verkada Security Camera Footage at Tesla, Cloudflare

Breach Exposes Verkada Security Camera Footage at Tesla,...

Surveillance footage from companies such as Tesla as well as hospitals, prisons,...

Nim-Based Malware Loader Spreads Via Spear-Phishing Emails

Nim-Based Malware Loader Spreads Via Spear-Phishing Emails

Spear-phishing emails are spreading the NimzaLoader malware loader, which some say...

Cyberattackers Exploiting Critical WordPress Plugin Bug

Cyberattackers Exploiting Critical WordPress Plugin Bug

The security hole in the Plus Addons for Elementor plugin was used in active zero-day...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here