Russian hackers switch to LOTL technique to cause power outage
Russian state hackers have evolved their methods for breaching industrial control systems by adopting living-off-the-land techniques that enable reaching the…
Russian state hackers have evolved their methods for breaching industrial control systems by adopting living-off-the-land techniques that enable reaching the…
Russian financial organization Sberbank states in a press release that two weeks ago it faced the most powerful distributed denial of…
Shared service provider TransForm has published an update on the cyberattack that recently impacted operations in multiple hospitals in Ontario,…
The North Korean-backed BlueNorOff threat group targets Apple customers with new macOS malware tracked as ObjCShellz that can open remote…
Microsoft has introduced a new protective feature in the Authenticator app to block notifications that appear suspicious based on specific checks…
The operators of the Kinsing malware are targeting cloud environments with systems vulnerable to "Looney Tunables," a Linux security issue identified…
Internet-exposed Apache ActiveMQ servers are also targeted in TellYouThePass ransomware attacks targeting a critical remote code execution (RCE) vulnerability previously…
Understanding API security risks isn't just a good idea — it's a business imperative. A single API breach can lead…
Trained teams can implement and test security measures and protocols to prevent and mitigate cyber breaches.
Posing as fellow engineers, the North Korean state-sponsored cybercrime group Lazarus tricked crypto-exchange developers into downloading the hard-to-detect malware.