Exploit Activity Surges 150% in Q2 Thanks to Log4ShelleinarAugust 11, 2022 Malware and botnet detections also soar View Post
New Malicious Python Libraries Found on PyPI RepositoryeinarAugust 10, 2022 Some of these packages were capable of stealing user credentials and environment variables View Post
US Treasury Sanctions Virtual Currency Mixer For Connections With Lazarus GroupeinarAugust 10, 2022 Tornado Cash would have been used to launder more than $7b in virtual currency since its foundation View Post
Report Provides Updates on July’s Maui Ransomware IncidenteinarAugust 10, 2022 The report extends CISA’s “first seen” date and the geolocation of the target to other countries View Post
Health Adviser Fined After Illegally Accessing Medical RecordseinarAugust 10, 2022 Former NHS employee ordered to pay victims compensation View Post
Smishing Attack Led to Major Twilio BreacheinarAugust 10, 2022 Firm tight-lipped on how many customers are affected View Post
Meta Takes Action Against Cyber Espionage Operations Targeting Facebook in South AsiaeinarAugust 9, 2022 The groups’ attacks were reportedly relatively low in sophistication but persistent and well-resourced View Post
Chinese Hackers May Be Behind Attacks Targeting Eastern Europe and AfghanistaneinarAugust 9, 2022 The phishing emails contained Microsoft Word documents that exploited the CVE-2017-11882 flaw View Post
Hackers Exploit Open Redirect Vulnerabilities to Conduct LogoKit Phishing CampaignseinarAugust 9, 2022 LogoKit is based on JavaScript and can change logos and text on landing pages in real-time View Post
North Korean Hackers Target Crypto Job SeekerseinarAugust 9, 2022 New social engineering campaign leverages Coinbase View Post