computer security

Volkswagen Group’s Systems Hacked: 19,000+ Documents StolenVolkswagen Group’s Systems Hacked: 19,000+ Documents Stolen

Volkswagen Group’s Systems Hacked: 19,000+ Documents Stolen

The Volkswagen Group has fallen victim to a sophisticated hacking incident, with over 19,000 sensitive documents stolen. Investigations point towards…

12 months ago
Windows MagicDot Path Flaw Lets Attackers Gain Rootkit-Like AbilitiesWindows MagicDot Path Flaw Lets Attackers Gain Rootkit-Like Abilities

Windows MagicDot Path Flaw Lets Attackers Gain Rootkit-Like Abilities

A new vulnerability has been unearthed, allowing attackers to gain rootkit-like abilities on Windows systems without requiring administrative privileges. Dubbed…

12 months ago
Researchers Claim that Windows Defender Can Be BypassedResearchers Claim that Windows Defender Can Be Bypassed

Researchers Claim that Windows Defender Can Be Bypassed

Cybersecurity experts from SafeBreach have revealed a series of vulnerabilities that could allow attackers to remotely delete files on a…

12 months ago
Akira Ransomware Attacks Over 250 Organizations and Collects $42 MillionAkira Ransomware Attacks Over 250 Organizations and Collects $42 Million

Akira Ransomware Attacks Over 250 Organizations and Collects $42 Million

The Akira ransomware variant has severely impacted more than 250 organizations worldwide, amassing approximately USD 42 million in ransom payments.…

12 months ago
Phishing-as-a-Service Platform LabHost Seized by AuthoritiesPhishing-as-a-Service Platform LabHost Seized by Authorities

Phishing-as-a-Service Platform LabHost Seized by Authorities

Authorities have dismantled LabHost, a notorious cybercrime platform that facilitated widespread phishing attacks across the globe. The crackdown on LabHost,…

12 months ago
What is Encryption in Malware? – Understand From Basics to XORWhat is Encryption in Malware? – Understand From Basics to XOR

What is Encryption in Malware? – Understand From Basics to XOR

Malware commonly encrypts its traffic (stolen data sent to a command-and-control server) and internal strings (like URLs and configurations) to…

12 months ago
Tor Browser 13.0.14 Released – What’s New!Tor Browser 13.0.14 Released – What’s New!

Tor Browser 13.0.14 Released – What’s New!

The Tor Project has released a new version of the Tor Browser, their secure and private web browsing tool. Tor…

12 months ago
Connect:fun Attacking Organizations Running Fortinet’s FortiClient EMSConnect:fun Attacking Organizations Running Fortinet’s FortiClient EMS

Connect:fun Attacking Organizations Running Fortinet’s FortiClient EMS

A new exploit campaign has emerged, targeting organizations that utilize Fortinet’s FortiClient EMS. Dubbed "Connect:fun" by Forescout Research – Vedere…

12 months ago
TA558 Hackers Compromised 320+ Organizations’ FTP & SMTP ServersTA558 Hackers Compromised 320+ Organizations’ FTP & SMTP Servers

TA558 Hackers Compromised 320+ Organizations’ FTP & SMTP Servers

TA558, a financially motivated threat actor identified in 2018, is targeting several countries but with utmost priority in Latin America.…

12 months ago
TA547 Hackers Launching AI-Powered Cyber Attacks Targeting OrganizationsTA547 Hackers Launching AI-Powered Cyber Attacks Targeting Organizations

TA547 Hackers Launching AI-Powered Cyber Attacks Targeting Organizations

TA547 has been targeting German organizations with an email campaign delivering the Rhadamanthys malware. Proofpoint has observed TA547 using Rhadamanthys,…

12 months ago