Skip to content
  • Home
  • Cyberattacks
  • Threats
  • Strategy
  • Breaches
  • Vulnerability
  • Leadership and careers
  • Regulation
27 Jan, 2023
Latest News:
F.B.I. Investigates Cyberattack That Targeted N.Y.C. Law Department
Hackers Attack Airlines with New RAT Downloader
Berlin security service blames Iran for cyberattack on German companies

  • Home
  • Cyberattacks
  • Threats
  • Strategy
  • Breaches
  • Vulnerability
  • Leadership and careers
  • Regulation
  • Home
  • Blog
  • Threats

Category: Threats

Prometheus and Grief

Prometheus and Grief – A new addition to the ransomware scene

02/06/202102/06/2021

The Prometheus group has put up data for 27 victims for sale, including information from government agencies in Mexico Cybersecurity Read more

News, Threats
  • Popular
  • Recent
  • Comments
  • Attackers are already using Log4Shell to install malware and miners

    Attackers are already using Log4Shell to install malware and miners

    13/12/2021
  • The court will consider Epic Games’ antitrust lawsuit against Apple

    The court will consider Epic Games’ antitrust lawsuit against Apple

    04/05/2021
  • Hackers attack cryptocurrency users through Tor servers

    Hackers attack cryptocurrency users through Tor servers

    10/05/2021
  • Germany bans FaceBook from collecting data from WhatsApp users

    Germany bans FaceBook from collecting data from WhatsApp users

    11/05/2021
  • Apple reports on the fight against fraud in 2020

    Apple reports on the fight against fraud in 2020

    11/05/2021
  • Attackers are already using Log4Shell to install malware and miners

    Attackers are already using Log4Shell to install malware and miners

    13/12/2021
  • Snatch hacked Volvo Cars and stole company documents

    Snatch hacked Volvo Cars and stole company documents

    12/12/2021
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

    Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

    11/12/2021
  • Phishers exploit OAuth holes in Microsoft and Google implementations

    Phishers exploit OAuth holes in Microsoft and Google implementations

    10/12/2021
  • The authors of the ransomware Cuba “earned” $ 44 million

    The authors of the ransomware Cuba “earned” $ 44 million

    07/12/2021

Categories

  • Breaches
  • Cyberattacks
  • Latest
  • News
  • Threats
  • uncategorized

Recent Posts

  • Attackers are already using Log4Shell to install malware and miners
  • Snatch hacked Volvo Cars and stole company documents
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers
  • Phishers exploit OAuth holes in Microsoft and Google implementations
  • The authors of the ransomware Cuba “earned” $ 44 million

Popular Posts

Attackers already using Log4Shell install malware miners

Attackers are already using Log4Shell to install malware and miners

13 Dec 2021
Snatch hacked Volvo Cars and stole company documents

Snatch hacked Volvo Cars and stole company documents

12 Dec 2021
Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

Dark Mirai botnet exploits RCE vulnerability in TP-Link routers

11 Dec 2021
Phishers exploit OAuth holes Microsoft Google implementations

Phishers exploit OAuth holes in Microsoft and Google implementations

10 Dec 2021

Recent Posts

  • Attackers are already using Log4Shell to install malware and miners
  • Snatch hacked Volvo Cars and stole company documents
  • Dark Mirai botnet exploits RCE vulnerability in TP-Link routers
  • Phishers exploit OAuth holes in Microsoft and Google implementations

Categories

  • Breaches
  • Cyberattacks
  • Latest
  • News
  • Threats
  • uncategorized

Facebook

Facebook

Popular Posts

Attackers are already using Log4Shell to install malware and miners

13 Dec 2021

Snatch hacked Volvo Cars and stole company documents

12 Dec 2021
Copyright © 2023 . All rights reserved.
 

Loading Comments...