Critical cryptographic flaws in top E2EE cloud platforms risk user data, allowing file tampering and injection.
The attack chain, per Positive Technologies, is an attempt to exploit CVE-2024-37383 (CVSS score: 6.1), a stored cross-site ...
North Korean IT workers posing as freelancers steal data from Western firms, demanding ransoms for its return.
DLP (Data Loss Prevention): As a cornerstone of data security, DLP ensures that sensitive data, such as personally ...
The shortcoming, codenamed HM Surf by the tech giant, is tracked as CVE-2024-44133. It was addressed by Apple as part of ...
Crypt Ghouls target Russian businesses and agencies using LockBit 3.0 and Babuk ransomware for financial gain.
The North Korean threat actor known as ScarCruft has been linked to the zero-day exploitation of a now-patched security flaw ...
The Russian threat actor known as RomCom has been linked to a new wave of cyber attacks aimed at Ukrainian government ...
Fake Google Meet pages deliver malware targeting Windows and macOS, spreading infostealers via ClickFix campaign.
SideWinder APT launches stealthy multi-stage attacks, deploying StealerBot malware against critical entities in the Middle ...
Group-IB reveals Cicada3301 ransomware’s affiliate panel, targeting U.S. and U.K. sectors with cross-platform attacks.
Cybercriminals abuse EDRSilencer to disable endpoint detection tools, making malicious activity harder to detect.