55Articles
8Categories
2024-11-28Date
🐛
Critical Jenkins Vulnerability Let Attackers Trigger DoS & Inject Scripts
⚠️
Cloudflare says it lost 55% of logs pushed to customers for 3.5 hours
⚠️
Hackers abuse popular Godot game engine to infect thousands of PCs
⚠️
Europol Dismantled Major Illegal IPTV Streaming Network Providers
⚠️
Integer Overflow vulnerability - Windows operating system.
⚠️
Die gefährlichsten Software-Schwachstellen 2024
⚠️
New Windows 11 Vulnerability Lets Attackers Elevate Privileges
⚠️
Cybercriminals Exploit Popular Game Engine Godot to Distribute Cross-Platform Malware
⚠️
Microsoft Patches Exploited Vulnerability in Partner Network Website
⚠️
Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups
⚠️
New Skimmer Malware Steals Credit Card Data From Checkout Pages
⚠️
SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive & Dropbox
⚠️
Helldown Ransomware Attacking Windows And Linux Servers Evading Detection
⚠️
SMOKEDHAM Backdoor Mimic As Legitimate Tools Leveraging Google Drive And Dropbox
⚠️
Mimic ransomware: what you need to know
⚠️
Malicious NPM Package Exploits React Native Documentation Example
⚠️
Over Two Dozen Flaws Identified in Advantech Industrial Wi-Fi Access Points – Patch ASAP
⚠️
Just Like Windows: Linux Targeted by First-Ever Bootkit
⚠️
E-Trojans: Ransomware, Tracking, DoS, and Data Leaks on Battery-powered Embedded Systems
⚠️
2023 Funding and Acquisition Summary with Return on Security - Mike Privette - ESW Vault
📋
Microsoft Patches Multiple Vulnerabilities Allow Attackers to Elevate Privileges
📋
Microsoft Re-Releasing Exchange Server Nov 2024 Security Update Fixing Transport Rules
🔥
UK hospital network postpones procedures after cyberattack
🔥
Pro-Russian Hacktivists Launch Branded Ransomware Operations
🔥
T-Mobile Shares More Information on China-Linked Cyberattack
🔥
Zello asks users to reset passwords after security incident
🔥
Researchers Detailed New Exfiltration Techniques Used By Ransomware Groups
🔥
Mimic Ransomware: What You Need To Know
🔥
Over 600,000 Records, Including Background Checks, Vehicle, and Property Records Exposed Online by an Information Service Provider
🔥
Breach Roundup: Microsoft Tries Again With Windows Recall
🕵️
Salt Typhoon’s cyberstorm reaches beyond US telcos
🕵️
Matrix, A Single Actor Orchestrate Global DDOS Attack Campaign
🕵️
What is with bad password requirements
🕵️
“Bootkitty” – A First Ever UEFI Bootkit Attack Linux Systems
🕵️
Shut Down Phishing Attacks -Detection & Prevention Checklist
🕵️
Attack Group APT-C-60 Targets Japan Using Trusted Platforms
🕵️
North Korean hackers have stolen billions in crypto by posing as VCs, recruiters and IT workers
🕵️
Beluga phishing campaign targets OneDrive credentials
🕵️
Instagram-Seite der CSU im Bundestag gehackt
🕵️
APT-C-60 Attacking HR Department With Weaponized Resumes
🕵️
Cryptohack Roundup: Judge Strikes Down 'Dealer Rule' Change
🕵️
Trump's Crypto Plans Raise Alarms Over Conflicts of Interest
🕵️
Tor in Russia: A call for more WebTunnel bridges
🌐
XMLRPC npm Library Turns Malicious, Steals Data, Deploys Crypto Miner
🎙️
Smashing Security podcast #395: Gym hacking, disappearing DNA, and a social lockout
📡
U.S. Telecom Giant T-Mobile Detects Network Intrusion Attempts from Wireline Provider
📡
Telegram Premium gift subscription scam | Kaspersky official blog
📡
The Future of Serverless Security in 2025: From Logs to Runtime Protection
📡
Live Webinar | AI-Powered Data Protection: Data Security Posture Management and Navigating New Frontiers
📡
One Serial Number Uncovered a Stash of Stolen Goods!
📡
Live Webinar | Mastering Cloud Environments: Best Practises for Managing Azure & AWS Data Security
📡
Fat-Free Pizza Bites? Here’s the Catch!
📡
Tor needs 200 new WebTunnel bridges to fight censorship
📡
Exposed on the Web: Thousands of Devices, Medical Records
📡
Scams to look out for this holiday season