Anonymous Sudan recently announced on Telegram the sale of a valuable Microsoft user data collection with a price tag of...
Using a lure relating to a lawsuit against the owner of Jack Daniels whiskey, the cybergang launched a campaign that may be bent on ransomware deployment....
Attacks on OT – hardware and software that monitors or controls equipment, assets and processes – have become more common. Amid the fast-changing security arrangement around...
Vade released its Phishers’ Favorites report for H1 2021, which revealed that there has been a major jump in phishing attacks since the start of the year with...
Research from Microsoft said Australians who continue to interact with a scammer lose about AU$126 on average. Within the Asia Pacific, Australians are second most likely...
Microsoft is warning customers about the LemonDuck crypto mining malware which is targeting both Windows and Linux systems and is spreading via phishing emails, exploits, USB...
Just about every app uses an application programming interface (API). From a security standpoint, though, APIs also come with some common problems. Gartner predicted that API abuse will...
Go is now one of the most popular programming languages on the platform. GitHub has announced a slew of supply chain security upgrades for modules based...
Mitre releases its list of the most dangerous software weaknesses, detailing the most common vulnerabilities which can give cyber criminals the ability to access machines to...
Whenever a major event happens in the world, cybercriminals try to take advantage of it. The Tokyo Olympics is on the radar of cybercriminals for the...
The report notes that other security teams have discovered large-scale cryptocurrency mining attacks against Kubernetes clusters. Analysts with cybersecurity company Intezer have found that cybercriminals are...
Recent Comments