Home Search
ransomware - search results
If you're not happy with the results, please do another search
TinyMCE Text Editor Flaw Let Attackers Execute XSS payload
Tiny Technologies, the company behind the popular text editor TinyMCE, announced the release of version 5.10.8 on October 19, 2023.
This new version aims to...
U.S. Government Releases Popular Phishing Technique Used by Hackers
Phishing is a cyberattack that uses deception to trick people into giving away sensitive information or taking actions that compromise security.
Phishing is often the...
React Developer Tools Flaw Let Attackers Launch a DDoS Attack
React Developer Tools is an essential tool for developers as it allows them to effectively inspect React components, modify the properties and state of...
GhostLocker – A New Generation of Raas from Hacktivist Groups
The increasing number of ransomware is on the rise primarily due to its lucrative nature and the inherent obscurity it provides to malicious actors...
Hackers Shifting Towards Non-Executable .txt & .log Files to Deliver Malware
Recently, researchers have found an increasing number of malware samples that employ code from non-executable files (such as .txt, .log, etc.), a strategy created...
Hackers Use Discord for C&C to Exploit Jupyter Notebooks & SSH
Jupyter Notebooks exposed to the internet are being targeted by a new crypto jacking campaign called Qubit Strike, which Cado Security Labs discovered.
The campaign...
Former Navy IT Manager Sentenced for Selling People’s Sensitive Data on Dark web
Marquis Hooper, a former IT Manager in the Navy, was sentenced to five years in prison for unlawfully accessing and tampering with a computer...
Citrix NetScaler Zero-Day Exploited to Compromise Government Organizations
Two critical security vulnerabilities, namely CVE-2023-4966 and CVE-2023-4967, have been discovered in NetScaler ADC and NetScaler Gateway.
These vulnerabilities impact several versions of the...
Sophos Firewall Password Disclosure Vulnerability: Patch Now!
Sophos, a well-known cybersecurity solutions provider, has promptly resolved a significant security vulnerability discovered in their Firewall system.
The flaw, reported by IT für Caritas...
Best Unified Network Security Solutions for Small Businesses
When managing user rights, privileged access, authentication, verification, analytics, and compliance metrics, a unified identity security platform streamlines what were once separate procedures.
Doing...