The threat actor behind the lesser-known AstraLocker ransomware told BleepingComputer they’re shutting down the operation and plan to switch to cryptojacking. The ransomware’s developer submitted a ZIP...
Google has released Chrome 103.0.5060.114 for Windows users to address a high-severity zero-day vulnerability exploited by attackers in the wild, the fourth Chrome zero-day patched in...
British Army’s Twitter and YouTube accounts were hacked and altered to promote online crypto scams sometime yesterday. Notably, the army’s verified Twitter account began displaying fake...
The Django project, an open source Python-based web framework has patched a high severity vulnerability in its latest releases. Tracked as CVE-2022-34265, the potential SQL Injection vulnerability exists in Django’s...
Monash University in Melbourne, Australia, has launched a public bug bounty program to help maintain the security of its digital platforms. The new program, which is...
A healthcare clinic based in Missouri has informed US regulators of a data breach incident affecting more than 90,000 individuals. Mattax Neu Prater Eye Center announced the...
An anonymous threat actor is selling several databases they claim to contain more than 22 terabytes of stolen information on roughly 1 billion Chinese citizens for...
Jen Easterly, the director of the US Cybersecurity and Infrastructure Security Agency (CISA), has warned the UK government that they could be the victim of a...
https://player.vimeo.com/video/725937762?h=b173b26f06&badge=0&autopause=0&player_id=0&app_id=58479&dnt=1 The past few years have clearly demonstrated that the longer it takes to detect malicious activities, the more costly the breach. In this Help Net...
Ivanti worked with global digital transformation experts and surveyed 10,000 office workers, IT professionals, and the C-Suite to evaluate the level of prioritization and adoption of DEX...