News
A threat actor known as ‘DrOne’ has claimed responsibility for leaking a scraped database from Chess.com, a popular online platform for chess enthusiasts, exposing the personal data of over 800,000 ...
A new open source phishing email analysis tool has been published on Githhub, which helps automate the analysis process. ThePhish, was created by Emanuele Galdi, a researcher at Italian cybersecurity ...
The healthcare and life sciences industry continues to be plagued by cybersecurity threats. 1 According to FTI Consulting’s U.S. Healthcare & Life Sciences Industry Outlook 2023 survey, 70 percent of ...
The Royal ransomware operation made its first appearance in January 2022, and throughout that year, it carried out several high-profile attacks against organizations, including Silverstone Circuit and ...
Easy Lab Setup in Minutes and Multiple Tools to Choose From DNS zone transfers use the AXFR protocol to replicate DNS records across DNS servers. If you do not protect your name servers, attackers can ...
In the ever-evolving landscape of cyber threats, a new player has emerged, signaling a significant shift in the tactics of Advanced Persistent Threat (APT) groups. Recent findings by cybersecurity ...
34 Russian-speaking groups distributing info-stealing malware under the stealer-as-a-service model, were identified by Group-IB. In the first seven months of 2022, the gangs collectively infected over ...
A high impact privacy bug was found in Facebook’s Android application by a young bug bounty hunter. The 19 year old hacker received a $4,500 bug bounty for an easy-to-exploit vulnerability found in ...
The Department of Defense (DoD) has taken a significant step towards fortifying the nation's cybersecurity by submitting its groundbreaking classified cyber strategy to Congress ...
One common tactic is embedding malicious macros within PDF files. When a user opens the PDF and enables macros, it triggers a malicious script that can download malware onto the victim’s system.
Many information security black friday deals you should grab right now, if you are a professional, a student, a researcher, or just a curious person who wants to do and learn more about cybersecurity.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results