A North Korean government-backed hacking group has been leveraging researchers’ curiosity for vulnerability research and exploit development, according to a recent Google Threat Analysis Group report. Fake persona...
The Fonix Ransomware operators have shut down their operation and released the master decryption allowing victims to recover their files for free. Fonix Ransomware, also known as...
As the manufacturing sector is moving towards automation and using software-centric and IoT technologies, cybercriminals see a larger attack surface to target to gain access inside...
UScellular, the fourth-largest wireless carrier in the U.S. with 4.9 million customers, has been hacked. According to a Bleeping Computer report, UScellular filed a breach data notification with...
A new variant of the freshly minted NAT slipstreaming attack has emerged that could use unmanaged, internal network devices as a bridgehead to – in the...
Here are the news and updates you may have missed. It is not accurate to describe widespread cyber intrusions that compromised several government agencies and cybersecurity...
A new machine learning technique could make it easier for penetration testers to find SQL injection exploits in web applications. Introduced in a recently published paper by researchers...
The domain registration belonging to Perl.com, the popular source of news and information about the Perl programming language, has reportedly been stolen. Brian Foy, a Perl...
In early 2020, the COVID-19 pandemic took the world by storm. Just as quickly as the virus began to spread, organizations were forced to act and...
The Sophos Rapid Response team published findings from its investigations into recent ransomware attacks that reveal a failure to keep close tabs on “ghost” account credentials...