Joker’s Stash, the internet’s largest marketplace for buying & selling stolen card data, announced today that it was shutting down within a month, on February 15,...
Joyce has long worked in US cybersecurity leadership, most recently serving as the NSA’s top representative in the UK. The National Security Agency (NSA) has confirmed longtime US...
Two children playing on their dad’s computer accidentally found a way to bypass the screensaver and access locked systems. The Linux Mint project has patched this...
Almost half of data breaches at hospitals were because of ransomware attacks – and those attacks could’ve been prevented with timely patching. Almost half of all...
FIN11 attackers in 2020 aimed at impersonating executives hoped using data stolen from top executives in the extortion process raises their chances that the victim pays...
Attackers are using the normally harmless Windows Finger command to download and install a malicious backdoor on victims’ devices. The ‘Finger’ command is a utility that...
In the aftermath of the SolarWinds hack, a better understanding of third-party hacks in any update that you provide to your colleagues, bosses, and even the...
TA551 (aka Shathak) is an email-based malware distribution campaign that is actively targeting English-speaking victims. Active since early 2020, TA551 is known to distribute multiple malware...
Since its emergence, xHunt campaign threat actors have been continuously attacking Kuwaiti organizations, mostly by targeting Microsoft Exchange servers. What’s new in the report? Recently, Palo...
The European Medicines Agency (EMA) today revealed that some of the stolen Pfizer/BioNTech vaccine candidate data was doctored by threat actors before being leaked online with...