Chinese Cybercriminals Exploit GHOSTSPIDER Malware to Breach Telecommunications in Over 12 Countries
Earth Estries, a threat actor associated with China, has been identified employing an undisclosed backdoor named GHOSTSPIDER in its operations...
Earth Estries, a threat actor associated with China, has been identified employing an undisclosed backdoor named GHOSTSPIDER in its operations...
There have been reports of the cybercriminal group called Enigmatic Elephant employing an enhanced variant of malware known as Asyncshell....
Individuals involved with Russia are connected to a cyber surveillance operation targeting companies in Central Asia, East Asia, and Europe....
Security defenders require every possible advantage. The team behind Sophos XDR has been concentrating on introducing features and tools that...
An approximate of 2,000 Palo Alto Networks devices are believed to have been infiltrated as a part of an ongoing...
An advanced persistent threat group linked to China, known as Gelsemium, has been detected employing a recently discovered Linux backdoor...
A quintet of reputed associates from the notorious Scattered Spider cyber gang have been charged in the United States for...
Recently, Google disclosed that its OSS-Fuzz tool driven by artificial intelligence has been instrumental in detecting 26 vulnerabilities in different...
Recently, several security vulnerabilities dating back decades have been uncovered in the needrestart package that comes pre-installed with Ubuntu Server...
Since at least 2020, a fresh cyber espionage faction connected to China has been identified as responsible for a sequence...
A malicious software called Ngioweb has been employed to power a well-known residential proxy platform named NSOCKS, along with other...
An essential authentication bypass flaw has been revealed in the Extremely Easy Security (previously Very Simple SSL) extension for WordPress...
An attacker fluent in Vietnamese has been connected to a scheme to steal data from government and educational institutions in...
Several malicious entities have been discovered exploiting a tactic known as Sitting Ducks to seize control of authentic domains to...
In the past, users have been able to acquire Windows operating system ISOs, but that opportunity was limited to the...