computer security

Researchers Observed Visual Studio Code Extensions Stealing Users’ Sensitive DataResearchers Observed Visual Studio Code Extensions Stealing Users’ Sensitive Data

Researchers Observed Visual Studio Code Extensions Stealing Users’ Sensitive Data

ReversingLabs has uncovered a series of Visual Studio Code (VS Code) extensions designed to transfer sensitive information from unsuspecting users.…

1 year ago
Jackson County Missouri Ransomware Attack Impacts IT SystemsJackson County Missouri Ransomware Attack Impacts IT Systems

Jackson County Missouri Ransomware Attack Impacts IT Systems

Jackson County, Missouri, has become the latest victim of a ransomware attack, which has caused substantial disruptions within its Information…

1 year ago
DarkGate Malware Abusing Cloud Storage & SEO Following Delivery Over TeamsDarkGate Malware Abusing Cloud Storage & SEO Following Delivery Over Teams

DarkGate Malware Abusing Cloud Storage & SEO Following Delivery Over Teams

DarkGate loader delivery surged after the Qakbot takedown, with financially motivated actors like TA577 and ransomware groups (BianLian, Black Basta)…

1 year ago
Authentic8 launches Silo Shield Program to Protect High-Risk Communities in Partnership with CISAAuthentic8 launches Silo Shield Program to Protect High-Risk Communities in Partnership with CISA

Authentic8 launches Silo Shield Program to Protect High-Risk Communities in Partnership with CISA

Authentic8, provider of the leading OSINT research platform Silo for Research, today launched their Silo Shield Program to enhance online…

1 year ago
Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber AttacksCompromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Compromised SaaS Supply Chain Apps: 97% of Organizations at Risk of Cyber Attacks

Businesses increasingly rely on Software as a Service (SaaS) applications to drive efficiency, innovation, and growth. However, this shift towards…

1 year ago
GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 ThreatsGoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus’s Latest Report Highlights How Blockchain Communities Are Leveraging Critical API Security Data To Mitigate Web3 Threats

GoPlus Labs, the leading Web3 security infrastructure provider, has unveiled a groundbreaking report highlighting the growing, widespread use and potential…

1 year ago
The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for ProxyThe Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

The Moon Malware Hacked 6,000 ASUS Routers in 72hours to Use for Proxy

Black Lotus Labs discovered a multi-year campaign by TheMoon malware targeting vulnerable routers and turning them into bots for the…

1 year ago
ZENHAMMER – First Rowhammer Attack Impacting Zen-based AMD PlatformsZENHAMMER – First Rowhammer Attack Impacting Zen-based AMD Platforms

ZENHAMMER – First Rowhammer Attack Impacting Zen-based AMD Platforms

Despite AMD's growing market share with Zen CPUs, Rowhammer attacks were absent due to challenges in reverse engineering DRAM addressing,…

1 year ago
Hackers Claiming that EagleSpy Android RAT 3.0 Steals 2FA Google Authenticator CodeHackers Claiming that EagleSpy Android RAT 3.0 Steals 2FA Google Authenticator Code

Hackers Claiming that EagleSpy Android RAT 3.0 Steals 2FA Google Authenticator Code

A malicious software known as EagleSpy Android RAT (Remote Access Trojan) 3.0 has been shared on a notorious online forum…

1 year ago
CrowdStrike Partnered with HCLTech to Drive Enterprise Cybersecurity TransformationCrowdStrike Partnered with HCLTech to Drive Enterprise Cybersecurity Transformation

CrowdStrike Partnered with HCLTech to Drive Enterprise Cybersecurity Transformation

CrowdStrike and HCLTech, a leading global technology company, have announced a strategic partnership. This collaboration aims to enhance HCLTech's managed…

1 year ago