Storm-0558, a cyberespionage group affiliated with the People's Republic of China, has reportedly compromised Microsoft Exchange mailboxes of 22 organizations…
March saw many notable phishing attacks, with criminals using new tactics and approaches to target unsuspecting victims. It is time…
PandaBuy, a popular online shopping platform, has been the victim of a significant data breach. This breach has resulted in…
Imperva SecureSphere WAF, a security tool for on-premise web applications, has a vulnerability in some versions that allows attackers to…
Hackers have been found leveraging Microsoft OneNote files as a vector to compromise systems across various industries. The campaign, under…
DinodasRAT, also known as XDealer, is a sophisticated C++ backdoor targeting multiple operating systems. It is designed to enable attackers…
EclecticIQ cybersecurity researchers have uncovered a cyberespionage operation dubbed "Operation FlightNight" targeting Indian government entities and energy companies. The attackers,…
Cybersecurity researchers at Unit 42 have uncovered a sophisticated cyberespionage campaign orchestrated by two Chinese Advanced Persistent Threat (APT) groups…
A recent security alert warns of three critical vulnerabilities actively exploited in the wild, of which the first is CVE-2023-48788,…
Political parties are often targeted by hackers since they want to achieve various goals. This is because hackers may attempt…