News
A new open source phishing email analysis tool has been published on Githhub, which helps automate the analysis process. ThePhish, was created by Emanuele Galdi, a researcher at Italian cybersecurity ...
A threat actor known as ‘DrOne’ has claimed responsibility for leaking a scraped database from Chess.com, a popular online platform for chess enthusiasts, exposing the personal data of over 800,000 ...
The healthcare and life sciences industry continues to be plagued by cybersecurity threats. 1 According to FTI Consulting’s U.S. Healthcare & Life Sciences Industry Outlook 2023 survey, 70 percent of ...
34 Russian-speaking groups distributing info-stealing malware under the stealer-as-a-service model, were identified by Group-IB. In the first seven months of 2022, the gangs collectively infected over ...
From data leaks and cybersecurity incidents enabled by careless users to the malicious theft of intellectual property (IP) or even workplace violence, insider threats continue to pose a significant ...
The Royal ransomware operation made its first appearance in January 2022, and throughout that year, it carried out several high-profile attacks against organizations, including Silverstone Circuit and ...
Penetration testing is a form of ethical security assessment which aims to help organizations identify, safely exploit, remove vulnerabilities and overall improve security across its IT infrastructure ...
In the ever-evolving landscape of cyber threats, a new player has emerged, signaling a significant shift in the tactics of Advanced Persistent Threat (APT) groups. Recent findings by cybersecurity ...
The Department of Defense (DoD) has taken a significant step towards fortifying the nation's cybersecurity by submitting its groundbreaking classified cyber strategy to Congress ...
Darktrace, a prominent leader in AI-driven cybersecurity solutions, has announced its intent to acquire Cado Security, a UK-based provider specializing in cyber investigation and response. The ...
Easy Lab Setup in Minutes and Multiple Tools to Choose From DNS zone transfers use the AXFR protocol to replicate DNS records across DNS servers. If you do not protect your name servers, attackers can ...
The Lancefly APT group has emerged as a formidable threat, employing a custom-written backdoor known as Merdoor, which is unleashing havoc on organizations across ...
Results that may be inaccessible to you are currently showing.
Hide inaccessible results