To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…
In a brazen act of digital deception, the U.S. Securities and Exchange Commission's (SEC) official Twitter account, @SECGov, was compromised…
GitHub has become a major platform that cybercriminals use for various attack methods such as payload delivery, dead drop resolution…
Invati Connect Secure (ICS) and Ivanti Policy Secure Gateways have been discovered with two new vulnerabilities associated with authentication bypass…
A vulnerability in the encryption algorithm used by the Black Basta ransomware has led researchers to develop a free decryptor…
Four Chinese cybercriminals were taken into custody after using ChatGPT to create ransomware. The lawsuit is the first of its…
Ubisoft, the renowned video game developer behind iconic franchises like Assassin's Creed and Far Cry, narrowly escaped a potentially devastating…
Threat actors targeting crypto wallets for illicit transactions have been in practice for quite some time. Threat actors have been…
In a recent turn of events, Ledger, a prominent hardware wallet provider, faced a security breach that sent shockwaves through…
Volt Typhoon, also known as the Bronze Silhouette, has been discovered to be linked with a complex botnet called "KV-botnet."…