Wordfence analysts report having detected a massive wave of attacks in the last couple of days, originating from 16,000 IPs and targeting over 1.6 million WordPress sites. The...
Security researchers can now test payloads against the OWASP ModSecurity Core Rule Set with a new sandbox released by the project maintainers. The Core Rule Set,...
Fujitsu says the attackers behind the May data breach used a vulnerability in the company’s ProjectWEB information-sharing tool to steal accounts from legitimate users and access...
Emotet, the notorious malware, has been discovered spreading via malicious Windows App Installer packages. These packages are impersonating the legitimate Adobe PDF software. The Emotet campaign ...
While there are various motivations for various threat actors, most of them are financially motivated. When it comes to cash, phishing becomes the default attack technique....
IT security researchers from Ruhr-Universität Bochum (RUB) and the Niederrhein University of Applied Sciences have discovered 14 new types of ‘XS-Leak’ cross-site leak attacks against modern...
A lesser-known threat actor group named WIRTE has been found to be active since 2019. While the group is touted to have relations with the Gaza...
Patient information from over 400,000 Planned Parenthood Los Angeles (PPLA) visitors has been accessed in a cyberattack targeting the California reproductive health provider. PPLA found suspicious...
Planned Parenthood Los Angeles has disclosed a data breach after suffering a ransomware attack in October that exposed the personal information of approximately 400,000 patients. According...
Email authentication checks could be hoodwinked by phishing emails impersonating nearly 200 Australian organizations due to a vulnerability discovered more than two years after its conception. Now fixed,...