As a result of an international law enforcement operation, the sites utilized by the Hive ransomware operation for both payments…
Rapid7 is taking action in response to several instances of compromise caused by the exploitation of CVE-2022-47966, which is a…
CircleCI, a DevOps platform, discovered that malware installed on a CircleCI engineer's laptop was used by an unauthorized third party…
There have been reports that an organized threat actor, known as Blind Eagle (tracked as APT-C-36), has re-appeared again with…
SMB servers that have ksmbd enabled are vulnerable to hacking due to a major Linux kernel vulnerability (CVSS score of…
It has recently been discovered by researchers that Windows has a vulnerability that allows code execution that rivals EternalBlue in…
On Friday, Google released a beta version of Client-side encryption (CSE) for Gmail. This newest service is only useful to…
Cyble Research and Intelligence Labs (CRIL) detected threat Actors (TAs) distributing the malware DarkTortilla. Since 2015, the complex .NET-based malware known…
Mandiant recently identified that in a targeted attack on Ukrainian government entities, trojanized ISO files were used by threat actors…
An open and unprotected database with 9,098,506 records of credit card transactions was discovered recently by security researcher Jeremiah Fowler…