Researchers at the University of Darmstadt, Brescia, CNIT, and the Secure Mobile Networking Lab, have published a paper that proves it’s possible to extract passwords and...
The information technology (IT) and communications sector was the most targeted industry globally in 2021, according to new data from Darktrace. The data shows that the...
It feels like IT and security pros are tasked with the impossible job of operating business-critical applications in Infrastructure as a Service (IaaS) environments in the...
At the start of 2020, businesses set out to execute on the well-laid, carefully thought out plans they’d spent months developing. But just a little over...
The Christmas holiday shopping season is around the corner and so are the Magecart attackers. Interestingly, these attackers have become more active than ever, with each...
Qakbot, the trojan known for stealing bank credentials, has started spreading ransomware payloads. The recent tactic is so confusing that network defenders are finding it hard...
Discord is becoming an increasingly popular chat application with more than 350 million users and cybercriminals are preying on its popularity. Now JFrog researchers discovered multiple...
One day in late November, an Australian electricity utility company was attacked. While it was initially suspected that the attack was conducted by Chinese hackers, it...
Nobelium, the infamous hacking group known for its SolarWinds supply chain attacks, is active again, breaching government and enterprise networks around the world. It is targeting...
Threat actors and researchers are scanning for and exploiting the Log4j Log4Shell vulnerability to deploy malware or find vulnerable servers. In this article we have compiled...