Sitemap
Pages
Posts by category
- Category: Cybercrime
- Category: Carding
- Category: Darkweb
- Australian Man Sentenced for Selling Ecstasy on the Darkweb
- Brave Browser Leaked DNS Queries for Onion Services
- Australian Border Force Seizes Meth Inside a Stuffed Llama
- New Change to German Postal Law Targets Internet Drug Trade
- Dream Market Vendor “Rackjaw2” Sentenced to Prison
- Feds Traced Bitcoin Transactions to a Drug Dealer’s Apartment
- Category: Fraud
- Category: The Deep Web
- Category: Hackers
- Category: Attacks
- Iran and Hezbollah Hackers Launch Attacks to Influence Israel-Hamas Narrative
- Learn How to Build an Incident Response Playbook Against Scattered Spider in Real-Time
- Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyber Attacks
- Microsoft, OpenAI Warn of Nation-State Hackers Weaponizing AI for Cyberattacks
- U.S. DoJ Dismantles Warzone RAT Infrastructure, Arrests Key Operators
- After FBI Takedown, KV-Botnet Operators Shift Tactics in Attempt to Bounce Back
- New Mispadu Banking Trojan Exploiting Windows SmartScreen Flaw
- Patchwork Using Romance Scam Lures to Infect Android Devices with VajraSpy Malware
- AnyDesk Hacked: Popular Remote Desktop Software Mandates Password Reset
- U.S. Sanctions 6 Iranian Officials for Critical Infrastructure Cyber Attacks
- U.S. Feds Shut Down China-Linked “KV-Botnet” Targeting SOHO Routers
- Category: Breaches
- Recover from Ransomware in 5 Minutes—We will Teach You How!
- Akira Ransomware Gang Extorts $42 Million; Now Targets Linux Servers
- FIN7 Cybercrime Group Targeting U.S. Auto Industry with Carbanak Backdoor
- Critical Atlassian Flaw Exploited to Deploy Linux Variant of Cerber Ransomware
- Russian APT Deploys New ‘Kapeka’ Backdoor in Eastern European Attacks
- Muddled Libra Shifts Focus to SaaS and Cloud for Extortion and Data Theft Attacks
- TA547 Phishing Attack Hits German Firms with Rhadamanthys Stealer
- Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files
- CL0P’s Ransomware Rampage – Security Measures for 2024
- The Drop in Ransomware Attacks in 2024 and What it Means
- Massive Phishing Campaign Strikes Latin America: Venom RAT Targeting Multiple Sectors
- Detecting Windows-based Malware Through Better Visibility
- CISA Alerts on Active Exploitation of Flaws in Fortinet, Ivanti, and Nice Products
- German Police Seize ‘Nemesis Market’ in Major International Darknet Raid
- Making Sense of Operational Technology Attacks: The Past, Present, and Future
- TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks
- E-Root Marketplace Admin Sentenced to 42 Months for Selling 350K Stolen Credentials
- LockBit Ransomware Hacker Ordered to Pay $860,000 After Guilty Plea in Canada
- How to Identify a Cyber Adversary: What to Look For
- How to Identify a Cyber Adversary: Standards of Proof
- BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks
- CISA Warns of Actively Exploited JetBrains TeamCity Vulnerability
- Russia-Sponsored Cyberattackers Infiltrate Microsoft’s Code Base
- Hacked WordPress Sites Abusing Visitors’ Browsers for Distributed Brute-Force Attacks
- Linux Variants of Bifrost Trojan Evade Detection via Typosquatting
- Alert: GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries
- Exit Scam: BlackCat Ransomware Group Vanishes After $22 Million Payout
- Spoofed Zoom, Google & Skype Meetings Spread Corporate RATs
- GhostLocker 2.0 Haunts Businesses Across Middle East, Africa & Asia
- Phobos Ransomware Aggressively Targeting U.S. Critical Infrastructure
- Taiwan’s Biggest Telco Breached by Suspected Chinese Hackers
- Infrastructure Cyberattacks, AI-Powered Threats Pummel Africa
- MTTR: The Most Important Security Metric
- LockBit Ransomware’s Darknet Domains Seized in Global Law Enforcement Raid
- U.S. Offers $15 Million Bounty to Hunt Down LockBit Ransomware Leaders
- Lovers’ Spat? North Korea Backdoors Russian Foreign Affairs Ministry
- LockBit Ransomware Group Resurfaces After Law Enforcement Takedown
- Cybersecurity for Healthcare—Diagnosing the Threat Landscape and Prescribing Solutions for Recovery
- LockBit Ransomware Operation Shut Down; Criminals Arrested; Decryption Keys Released
- How Businesses Can Safeguard Their Communication Channels Against Hackers
- U.S. State Government Network Breached via Former Employee’s Account
- Cybersecurity Tactics FinServ Institutions Can Bank On in 2024
- Midnight Blizzard and Cloudflare-Atlassian Cybersecurity Incidents: What to Know
- Hackers Exploit Job Boards, Stealing Millions of Resumes and Personal Data
- Category: Phishing
- Category: Attacks
- Category: Malware
- Category: Malware Analysis
- Chinese government hackers attack Russian companies for the first time
- Rare UEFI Malware Found in the wild Kaspersky says
- How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
- IcedID Malware Updates new techniques To Avoid Detection
- New Info Stealer Poulight From The Russian Underground
- Category: Threats
- Forced Chrome extensions get removed, keep reappearing
- ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
- Credential-stealing malware disguises itself as Telegram, targets social media users
- Don’t let scammers ruin your Valentine’s Day
- SolarWinds attackers launch new campaign
- Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
- The UNC2529 Triple Double: A Trifecta Phishing Campaign
- UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
- Abusing Replication: Stealing AD FS Secrets Over the Network
- Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity
- Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
- Category: Malware Analysis
- Category: Security
- Category: Cloud Security
- Crawl, Walk, Run: Operationalizing Your IaC Security Program
- How To Prevent the IaC Misconfiguration Snowball Effect
- Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
- You Must Comply! Why You Need Proactive Open-Source License Compliance
- Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra
- Prisma Cloud Provides New Extensive Use Cases for Azure Customers
- 6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
- 9 Essential Infrastructure Security Considerations for Kubernetes
- Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
- Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
- Building the Business Case for DevSecOps
- What is Infrastructure as Code? The Best Way to Fully Control Your Cloud Configuration
- Category: IoT
- A Roadmap to Secure Connected Cars: Charting the WP.29’s UN Regulation No. 155
- The Transition to 5G: Security Implications of Campus Networks
- Lost in Translation
- The Cybersecurity Blind Spots of Connected Cars
- New P2P Botnet Targeting IoT Devices
- IoT Security, Attacks And The Industrial Systems at Risk
- Category: Mobile
- Google removes 16 malicious apps from play store found to be part of the Joker malware family
- WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
- Vulnerabilities in old GTP protocol could affect 4G and 5G networks
- Google is indexing the phone numbers of WhatsApp Users
- Chinese authorities monitor content of WeChat users registered outside China
- Category: Threat Intelligence
- Microsoft to Block Excel Add-ins to Stop Office Exploits
- ‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
- Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access
- Hunting Insider Threats on the Dark Web
- FanDuel Sportsbook Bettors Exposed in Mailchimp Breach
- Ransomware Profits Decline as Victims Dig In, Refuse to Pay
- Attackers Crafted Custom Malware for Fortinet Zero-Day
- Cybercriminals Target Telecom Provider Networks
- Name That Toon: Poker Hand
- New Coalfire Report Reveals CISOs Rising Influence
- ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
- Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
- Category: Web Applications
- Category: Cloud Security