
Cybercrime Groups ShinyHunters, Scattered Spider Join Forces in Extortion Attacks on Businesses
An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers,…
An ongoing data extortion campaign targeting Salesforce customers may soon turn its attention to financial services and technology service providers,…
A previously undocumented threat actor dubbed Curly COMrades has been observed targeting entities in Georgia and Moldova as part of…
Cybersecurity researchers have discovered a fresh set of security issues in the Terrestrial Trunked Radio (TETRA) communications protocol, including in…
This week, cyber attackers are moving quickly, and businesses need to stay alert. They’re finding new weaknesses in popular software…
Malicious actors have been observed exploiting a now-patched critical security flaw impacting Erlang/Open Telecom Platform (OTP) SSH as early as…
The Evolution of Exposure Management Most security teams have a good sense of what’s critical in their environment. What’s harder…
The maintainers of the WinRAR file archiving utility have released an update to address an actively exploited zero-day vulnerability. Tracked…
A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the world to create…
A novel attack technique could be weaponized to rope thousands of public domain controllers (DCs) around the world to create…
Cybersecurity researchers have discovered a set of 11 malicious Go packages that are designed to download additional payloads from remote…