New Phishing Campaign Targets Oil & Gas with Evolved Data-Stealing Malware
Apr 04, 2024NewsroomPhishing Attack / Malware An updated version of an information-stealing malware called Rhadamanthys is being used in phishing...
Apr 04, 2024NewsroomPhishing Attack / Malware An updated version of an information-stealing malware called Rhadamanthys is being used in phishing...
Jackson County, Missouri, discloses a ransomware attack Pierluigi Paganini April 04, 2024 Jackson County, Missouri, confirmed that a ransomware attack...
To deploy a ransomware attack, adversaries must first gain access to a victim’s corporate environment, devices, and data. Threat actors...
Pentera is an automated pentesting platform. Validate every attack surface in your network, and test continuously to maintain control over...
In a major boost to technology infrastructural security, Cybereason, an industry leader in future-ready attack protection, alongside Observe, has launched...
Lessons from a Ransomware Attack against the British Library You might think that libraries are kind of boring, but this...
Mar 29, 2024NewsroomSupply Chain Attack / Threat Intelligence The maintainers of the Python Package Index (PyPI) repository briefly suspended new...
Independent provider of breach and attack simulation (BAS) solutions, AttackIQ, has announced the launch of AttackIQ Ready! 2.0. This managed...
Finnish police linked APT31 to the 2021 parliament attack Pierluigi Paganini March 27, 2024 The Finnish Police attributed the attack...
A Python coding community is undergoing a software supply-chain attack, with threat actors targeting the 170,000-strong Top.gg GitHub organisation with...
Mar 26, 2024NewsroomCyber Attack / Vulnerability The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday placed three security flaws...
GoFetch side-channel attack against Apple systems allows secret keys extraction Pierluigi Paganini March 25, 2024 Researchers demonstrated a new side-channel...
Mar 25, 2024NewsroomSupply Chain Attack / Cryptocurrency Unidentified adversaries orchestrated a sophisticated attack campaign that has impacted several individual developers...
Ordr has unveiled its latest innovation, the OrdrAI CAASM+ (Cyber Asset Attack Surface Management) product. This new offering is designed...
A group of US academics has demonstrated a side-channel attack against Apple’s M-series silicon, extracting keys from constant-time encryption processes. ...