EncroChat dismantling led to 6,558 arrests and the seizure of $979M in criminal funds
Europol announced that the takedown of the EncroChat encrypted chat network has led to the arrest of 6,558 people and...
Europol announced that the takedown of the EncroChat encrypted chat network has led to the arrest of 6,558 people and...
Mockingjay is a new process injection technique that can be exploited to bypass security solutions to execute malware on compromised...
Researchers at Censys have identified hundreds of devices deployed within federal networks that have internet-exposed management interfaces. Researchers at Censys...
Clop ransomware group added five new victims of MOVEit attacks to its dark web leak site, including Schneider Electric and...
An unnamed Japanese cryptocurrency exchange was the victim of a cyber attack aimed at deploying an Apple macOS backdoor named...
Milomir Desnica, a citizen of Croatia and Serbia, has been charged with running the Monopoly Market drug darknet marketplace. Milomir...
The cyber attack suffered by Suncor Energy impacted payment operations at Petro-Canada gas stations in Canada. Suncor Energy is Canada’s...
The Internet Systems Consortium (ISC) addressed three denial-of-service (DoS) vulnerabilities in the DNS software suite BIND. The Internet Systems Consortium...
China-linked APT group VANGUARD PANDA, aka Volt Typhoon, was spotted observing a novel tradecraft to gain initial access to target...
Researchers observed threat actors spreading a trojanized Super Mario Bros game installer to deliver multiple malware. Researchers from Cyble Research...
A U.K. citizen, who was involved in the attack on Twitter in 2020, was sentenced to five years in prison...
This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies...
U.S. Army’s Criminal Investigation Division warns that US military personnel have reported receiving unsolicited smartwatches in the mail. The U.S. Army’s...
U.S. Cybersecurity and Infrastructure Security Agency (CISA) added six new vulnerabilities to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity...
VMware addressed multiple memory corruption vulnerabilities in vCenter Server that can be exploited to achieve remote code execution. VMware released...