High-endAPTgroupsperformhighlyinterestingsocialengineeringcampaignsinordertopenetratewell-protectedtargets.Forexample,carefullyconstructedforumrespons...
High-endAPTgroupsperformhighlyinterestingsocialengineeringcampaignsinordertopenetratewell-protectedtargets.Forexample,carefullyconstructedforumrespons...
The judge with Spain’s National Court said there is reason to believe that the new information provided by France can “allow the investigations to adv...
Four Iranians are accused of hacking into critical systems at the Departments of Treasury and State and dozens of private US companies. The post $10 M...
UnitedHealth confirms that personal and health information was stolen in a ransomware attack that could cost the company up to $1.6 billion. The post ...
Russia-linked APT28 deploys the GooseEgg post-exploitation tool against numerous US and European organizations. The post Russian Cyberspies Deliver ‘G...
Mandiant's M-Trends 2024 report shows that defenses are improving – and that may be true. But the reality remains that these same statistics demonstra...
Microsoft PlayReady vulnerabilities that could allow rogue subscribers to illegally download movies from popular streaming services. The post Microsof...
The LockBit ransomware gang leaks data allegedly stolen from government contractor Tyler Technologies. The post Ransomware Gang Leaks Data Allegedly S...
Palo Alto Networks firewall vulnerability CVE-2024-3400, exploited as a zero-day, impacts a Siemens industrial product. The post Siemens Industrial Pr...
Shadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400. The post Thousands...
CrushFTP patches a zero-day vulnerability allowing unauthenticated attackers to escape the VFS and retrieve system files. The post CrushFTP Patches Ex...
A hack that caused a small Texas town’s water system to overflow in January has been linked to a shadowy Russian hacktivist group, the latest case of ...
Vulnerabilities in Palo Alto Networks Cortex XDR allowed a security researcher to turn it into a malicious offensive tool. The post Research Shows How...
WecontinuecoveringtheactivitiesoftheAPTgroupToddyCat.Inourpreviousarticle,wedescribedtoolsforcollectingandexfiltratingfiles(LoFiSeandPcExter).Thistime...
MITRE R&D network hacked in early January by a state-sponsored threat group that exploited an Ivanti zero-day vulnerability. The post MITRE Hacked by ...
Cannes Hospital Centre – Simone Veil cancels medical procedures after shutting down systems in response to a cyberattack. The post Cannes Hospital Can...
VulnCheck banks $8 million in early stage capital to build 'exploit intelligence' technologies and services. The post Threat-Intelligence Startup Vuln...
Investors make an early-stage $6.5 million bet on BreachRx, a startup promising to shield cybersecurity executives from personal liability. The post B...
Microsoft warns that several OpenMetadata vulnerabilities are being exploited to deploy cryptomining malware to Kubernetes environments. The post Open...
Telecom giant Frontier shuts down systems to contain a cyberattack that led to personal information compromise. The post Frontier Communications Shuts...