Cunning Credit Card Skimmer Targets Magento Sites via Swap Files
Jul 23, 2024NewsroomThreat Detection / Website Security Adversaries have been spotted employing swap files on compromised websites to hide a...
Jul 23, 2024NewsroomThreat Detection / Website Security Adversaries have been spotted employing swap files on compromised websites to hide a...
July 23, 2024NewsroomSecurity Threat / Website Protection Risk actors have been uncovered using exchange files in infiltrated websites to hide...
Discover the crucial risks affecting your company and the malicious actors behind them. Our experts at Cybersixgill shed light on...
Jul 18, 2024NewsroomOpen-Source / Cybercrime Anonymous menace actors have been sighted utilizing open-source instruments as components of a suspected cyber...
Jul 17, 2024NewsroomVulnerability / Data Protection Malicious actors are actively taking advantage of a recently exposed severe security weakness affecting...
AT&T, a US telecommunications company, has verified that cybercriminals successfully breached data related to "almost all" of its mobile clients...
July 11, 2024PressroomSoftware Safety / Menace Intelligence Malevolent actors have been noticed releasing a fresh surge of harmful bundles to...
Jul 11, 2024NewsroomCyber Assault / Weakness Various threat actors have been spotted taking advantage of a recently exposed security vulnerability...
Jul 09, 2024NewsroomSupply Chain Breach / Internet Safety Hackers have been discovered spreading infected versions of jQuery on npm, GitHub,...
Jul 03, 2024NewsroomSpyware / Vulnerability Unidentified malicious actors have exploited a resolved security issue in Microsoft MSHTML to deploy a...
Jul 03, 2024NewsroomSpyware / Vulnerability Unidentified threat actors have exploited a recently patched security vulnerability in Microsoft MSHTML to disseminate...
Jun 24, 2024NewsroomMobile Security / Threat Intelligence Several threat actors, comprising cyber espionage factions, are using an open-source Android remote...
June 20, 2024Media RoomFirmware Security / Vulnerability Online security experts have revealed specifics of a now-fixed security loophole in Phoenix...
Jun 20, 2024NewsroomCyber Intrusion / Hacking Stories Russian-linked state-backed groups have been tied to focused cyber offensives directed at French...
Jun 17, 2024NewsroomWeb Security / Malware Websites with legal status that have been compromised are now utilized as a medium...