The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and…
The People's Cyber Army of Russia is a Russian hacktivist group known for its strategic use of DDoS attacks and…
Zoom is a widely used videotelephony software used for virtual meetings, and its wide audience base attracts the hackers most.…
The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a…
Microsoft has identified a new Iranian state-sponsored threat actor, Peach Sandstorm, deploying a custom multi-stage backdoor named Tickler. This backdoor…
Hackers usually shift their attention towards Atlassian due to flaws in its software, especially in products like Confluence, which put…
The APT-Q-12 group, also known as Pseudo Hunter, is a Northeast Asian threat actor linked to Darkhotel, which primarily targets…
Cybercriminals are leveraging platforms like GitHub to spread the Lumma information stealer malware. This sophisticated threat is part of a…
Windows drivers can be abused to bypass security measures. Attackers can exploit vulnerabilities in legitimate drivers or use stolen or…
The Port of Seattle and Seattle-Tacoma International Airport (Sea-Tac) were hit by a cyberattack over the weekend. Airport officials confirmed…