Halliburton Company has confirmed that a cyber attack led to unauthorized access and data theft from its systems. The incident,…
A new malicious software named "Fury Stealer" has been detected, posing a significant threat to online security. The malware, created…
Microsoft identified a new custom multi-stage backdoor, "Tickler," deployed by the Iranian state-sponsored threat actor Peach Sandstorm between April and…
The FBI, CISA, MS-ISAC, and HHS have released a joint advisory detailing known RansomHub ransomware indicators of compromise (IOCs) and…
The People's Cyber Army of Russia is a Russian hacktivist group known for its strategic use of DDoS attacks and…
Zoom is a widely used videotelephony software used for virtual meetings, and its wide audience base attracts the hackers most.…
The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a…
Microsoft has identified a new Iranian state-sponsored threat actor, Peach Sandstorm, deploying a custom multi-stage backdoor named Tickler. This backdoor…
Hackers usually shift their attention towards Atlassian due to flaws in its software, especially in products like Confluence, which put…
The APT-Q-12 group, also known as Pseudo Hunter, is a Northeast Asian threat actor linked to Darkhotel, which primarily targets…