Canon has finally confirmed that it was the victim of a ransomware attack in early August and that the threat actors also stole data from its servers. In...
Users of the popular Drupal content management system (CMS) ought to patch their installations to defend against recently resolved, critical vulnerabilities. Various versions of the widely used, PHP...
A remote code execution (RCE) vulnerability that could expose a users’ cloud assets has been patched in the open source, Elixir-based Paginator project. Discovered by security expert Peter...
As InterSloth’s latest game Among Us has quickly become a fan favorite on both PC and mobile, cybercriminals have taken note and they are now using fake versions...
Cybercriminals often leverage open-source tools or code in attack campaigns. The use of legitimate tools makes attacks stealthier as they are not flagged as suspicious by...
Recently, some attackers were observed targeting several cryptocurrency services by attacking their hosting service providers. What happened? A hacker group targeted domain hosting provider GoDaddy and tricked its...
Despite the recent coordinated takedown attempt by Microsoft and other groups against the notorious malware TrickBot, the malware operators have released the hundredth build as TrickBot v100 with...
The last year — a harrowing period for the world economy because of the Covid-19 pandemic — was also marked by the rise of the underground market for...
Internet technologist Jim Fenton has questioned the assertion that the future is necessarily ‘passwordless’. Many new authentication technologies are advertising themselves as passwordless. This an attractive promise to...
Security researchers have discovered more than 400,000 subdomains with misconfigured CNAME records, leaving many at risk of malicious takeover as a result. When websites are externally...