A cybercriminal group is selling and distributing a sophisticated phishing kit called "V3B" through Phishing-as-a-Service (PhaaS) and self-hosting methods, which…
The ransomware landscape is rapidly diversifying in 2024, with a surge in new extortion groups as established attackers continue to…
Gift cards are attractive to hackers since they provide quick monetization for stolen data or compromised systems. Reselling gift cards…
Researchers identified a PDF exploit targeting Foxit Reader users that uses a design flaw that presents security warnings with a…
Hackers target smart homes due to the increased interconnected devices with often insufficient security measures. Smart homes provide a wealth…
The Polish computer emergency response team CERT.pl has issued a warning about an ongoing cyberattack campaign by the notorious APT28…
Vincent Cannady, a professional who used to work as a consultant in the cybersecurity field, has been taken into custody…
Hackers use deep fake AI photos to impersonate individuals online, allowing them to deceive, manipulate, or gain unauthorized access to…
Cisco has released critical security updates to address multiple vulnerabilities in its Adaptive Security Appliance (ASA) devices and Firepower Threat…
Law enforcement operations disrupted BlackCat and LockBit RaaS operations, including sanctions on LockBit members aiming to undermine affiliate confidence. In…