This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here
Category: Cyber Security
U.S. Dismantles World's Largest 911 S5 Botnet with 19 M...
The U.S. Department of Justice (DoJ) on Wednesday said it dismantled what it described as "likely the world's largest botnet ever,...
Okta Warns of Credential Stuffing Attacks Targeting Cus...
Okta is warning that a cross-origin authentication feature in Customer Identity Cloud (CIC) is susceptible to credential stuffing ...
Europol Shuts Down 100+ Servers Linked to IcedID, Trick...
Europol on Thursday said it shut down the infrastructure associated with several malware loader operations such as IcedID, SystemB...
Researchers Uncover Active Exploitation of WordPress Pl...
Cybersecurity researchers have warned that multiple high-severity security vulnerabilities in WordPress plugins are being actively...
How to Build Your Autonomous SOC Strategy
Security leaders are in a tricky position trying to discern how much new AI-driven cybersecurity tools could actually benefit a se...
RedTail Crypto-Mining Malware Exploiting Palo Alto Netw...
The threat actors behind the RedTail cryptocurrency mining malware have added a recently disclosed security flaw impacting Palo Al...
FlyingYeti Exploits WinRAR Vulnerability to Deliver COO...
Cloudflare on Thursday said it took steps to disrupt a month-long phishing campaign orchestrated by a Russia-aligned threat actor ...
Cyber Espionage Alert: LilacSquid Targets IT, Energy, a...
A previously undocumented cyber espionage-focused threat actor named LilacSquid has been linked to targeted attacks spanning vario...
CISA Alerts Federal Agencies to Patch Actively Exploite...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a security flaw impacting the Linux kernel to t...
OpenAI, Meta, and TikTok Crack Down on Covert Influence...
OpenAI on Thursday disclosed that it took steps to cut off five covert influence operations (IO) originating from China, Iran, Isr...
Beyond Threat Detection – A Race to Digital Security
Digital content is a double-edged sword, providing vast benefits while simultaneously posing significant threats to organizations ...
Russian Hackers Target Europe with HeadLace Malware and...
The Russian GRU-backed threat actor APT28 has been attributed as behind a series of campaigns targeting networks across Europe wit...