3CX hack caused by trading software supply chain attack
An investigation into last month's 3CX supply chain attack discovered that it was caused by another supply chain compromise where…
An investigation into last month's 3CX supply chain attack discovered that it was caused by another supply chain compromise where…
Poland's Military Counterintelligence Service and its Computer Emergency Response Team have linked APT29 state-sponsored hackers, part of the Russian government's…
A new Python-based credential harvester and SMTP hijacking tool named 'Legion' is being sold on Telegram, allowing cybercriminals to automate…
The Dutch government will adopt the RPKI (Resource Public Key Infrastructure) standard on all its systems before the end of…
CISA is advising Nexx customers to unplug impacted devices until the security issues are addressed — but so far, it's…
"Nexus" is the latest in a vast and growing array of Trojans targeting mobile banking and cryptocurrency applications.
The fallout from the Clop ransomware attacks on GoAnywhere platforms has become apparent this week, with the threat actors starting…
Here is a cautionary tale of what happens if side-projects or sections of the website becomes obsolete. If you don't…
Between March 3 and March 9, at least 2,000 people a day downloaded the malicious "Quick access to ChatGPT" Chrome…
Microsoft's Security Intelligence team recently investigated a business email compromise (BEC) attack and found that attackers move rapidly, with some…