Skip to content
  • Home
  • Cyberattacks
  • Threats
  • Strategy
  • Breaches
  • Vulnerability
  • Leadership and careers
  • Regulation
27 Jan, 2023
Latest News:
F.B.I. Investigates Cyberattack That Targeted N.Y.C. Law Department
Hackers Attack Airlines with New RAT Downloader
Berlin security service blames Iran for cyberattack on German companies

  • Home
  • Cyberattacks
  • Threats
  • Strategy
  • Breaches
  • Vulnerability
  • Leadership and careers
  • Regulation
  • Home
  • Blog
  • News

Category: News

Attackers already using Log4Shell install malware miners

Attackers are already using Log4Shell to install malware and miners

13/12/202113/12/2021

Cybercriminals have already taken advantage of the dangerous Log4j Log4Shell flaw, through which they try to deploy malware to vulnerable Read more

Latest, News
Snatch hacked Volvo Cars and stole company documents

Snatch hacked Volvo Cars and stole company documents

12/12/202112/12/2021

Volvo Cars, a Swedish passenger car manufacturer, has reported a breach in its network. According to the company’s official statement, Read more

Latest, News
Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

11/12/202112/12/2021

Cybersecurity experts have become aware of the active exploitation of a vulnerability affecting millions of routers. As noted by experts, Read more

Latest, News
Phishers exploit OAuth holes Microsoft Google implementations

Phishers exploit OAuth holes in Microsoft and Google implementations

10/12/202113/12/2021

Cybersecurity researchers have discovered previously unknown methods of launching cyberattacks with URL redirects on weak OAuth 2.0 implementations. Such attacks Read more

Latest, News
The authors ransomware Cuba "earned" $ 44 million

The authors of the ransomware Cuba “earned” $ 44 million

07/12/202107/12/2021

Officials from the Federal Bureau of Investigation (FBI) say Cuba ransomware operators earned at least $ 43.9 million this year. In an Read more

Latest, News
iPhone American diplomats infected NSO Group malware

iPhone of American diplomats infected with NSO Group malware

07/12/202107/12/2021

Apple has notified several US State Department officials that their devices are infected with spyware developed by Israel’s NSO Group, Reuters and  The Read more

Latest, News
Unknown attackers have controlled thousands malicious Tor nodes since 2017

Unknown attackers have controlled thousands of malicious Tor nodes since 2017

07/12/2021

The cybersecurity researcher, known under the pseudonym Nusenu, said that he had identified the hacking group KAX17, which controlled thousands of malicious Read more

Latest, News
226 vulnerabilities found popular router models

226 vulnerabilities found in popular router models

04/12/202106/12/2021

Researchers at IoT Inspector, in collaboration with Chip, have verified the security of many popular routers from Asus, AVM, D-Link, Netgear, Edimax, Read more

Latest, News
Zoho urges install patches soon possible: hackers already exploit bug ManageEngine

Zoho urges to install patches as soon as possible: hackers already exploit a bug in ManageEngine

04/12/202106/12/2021

The Zoho developers urged their customers to urgently update their Desktop Central and Desktop Central MSP installations to the latest version available. The Read more

Latest, News
Spammers send antirabota movement manifestos receipt printers

Spammers send antirabota movement manifestos to receipt printers

03/12/202106/12/2021

Spam mailings became known on Tuesday, writes Vice. An employee of one of the companies said that the printer in his office printed a text Read more

Latest, News

Posts navigation

1 2 … 28 Next
  • Popular
  • Recent
  • Comments
  • Attackers are already using Log4Shell to install malware and miners

    Attackers are already using Log4Shell to install malware and miners

    13/12/2021
  • The court will consider Epic Games’ antitrust lawsuit against Apple

    The court will consider Epic Games’ antitrust lawsuit against Apple

    04/05/2021
  • Hackers attack cryptocurrency users through Tor servers

    Hackers attack cryptocurrency users through Tor servers

    10/05/2021
  • Germany bans FaceBook from collecting data from WhatsApp users

    Germany bans FaceBook from collecting data from WhatsApp users

    11/05/2021
  • Apple reports on the fight against fraud in 2020

    Apple reports on the fight against fraud in 2020

    11/05/2021
  • Attackers are already using Log4Shell to install malware and miners

    Attackers are already using Log4Shell to install malware and miners

    13/12/2021
  • Snatch hacked Volvo Cars and stole company documents

    Snatch hacked Volvo Cars and stole company documents

    12/12/2021
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

    Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

    11/12/2021
  • Phishers exploit OAuth holes in Microsoft and Google implementations

    Phishers exploit OAuth holes in Microsoft and Google implementations

    10/12/2021
  • The authors of the ransomware Cuba “earned” $ 44 million

    The authors of the ransomware Cuba “earned” $ 44 million

    07/12/2021

Categories

  • Breaches
  • Cyberattacks
  • Latest
  • News
  • Threats
  • uncategorized

Recent Posts

  • Attackers are already using Log4Shell to install malware and miners
  • Snatch hacked Volvo Cars and stole company documents
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers
  • Phishers exploit OAuth holes in Microsoft and Google implementations
  • The authors of the ransomware Cuba “earned” $ 44 million

Popular Posts

Attackers already using Log4Shell install malware miners

Attackers are already using Log4Shell to install malware and miners

13 Dec 2021
Snatch hacked Volvo Cars and stole company documents

Snatch hacked Volvo Cars and stole company documents

12 Dec 2021
Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

11 Dec 2021
Phishers exploit OAuth holes Microsoft Google implementations

Phishers exploit OAuth holes in Microsoft and Google implementations

10 Dec 2021

Recent Posts

  • Attackers are already using Log4Shell to install malware and miners
  • Snatch hacked Volvo Cars and stole company documents
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers
  • Phishers exploit OAuth holes in Microsoft and Google implementations

Categories

  • Breaches
  • Cyberattacks
  • Latest
  • News
  • Threats
  • uncategorized

Facebook

Facebook

Popular Posts

Attackers are already using Log4Shell to install malware and miners

13 Dec 2021

Snatch hacked Volvo Cars and stole company documents

12 Dec 2021
Copyright © 2023 . All rights reserved.
 

Loading Comments...