Bug Bounty Programs, Hacking Contests Power China’s Cyber Offense
With the requirement that all vulnerabilities first get reported to the Chinese government, once-private vulnerability research has become a goldmine…
With the requirement that all vulnerabilities first get reported to the Chinese government, once-private vulnerability research has become a goldmine…
A newly discovered Linux malware dubbed 'DISGOMOJI' uses the novel approach of utilizing emojis to execute commands on infected devices…
Chinese threat actors are targeting ThinkPHP applications vulnerable to CVE-2018-20062 and CVE-2019-9082 to install a persistent web shell named Dama. [...]
The Computer Emergency Response Team of Ukraine (CERT-UA) reports about a new campaign dubbed "SickSync," launched by the UAC-0020 (Vermin)…
Attackers are targeting GitHub repositories, wiping their contents, and asking the victims to reach out on Telegram for more information.…
Chinese shopping platform Pandabuy told BleepingComputer it previously paid a a ransom demand to prevent stolen data from being leaked,…
Club Penguin fans hacked a Disney Confluence server to steal information about their favorite game but wound up walking away…
Japanese bitcoin exchange DMM Bitcoin is warning that 4,502.9 Bitcoin (BTC), or approximately $308 million (48.2 billion yen), has been…
Law enforcement agencies in the United States and Europe today announced Operation Endgame, a coordinated action against some of the…
The U.S. Treasury Department has sanctioned a cybercrime network comprising three Chinese nationals and three Thailand-based companies linked to a…