Home Search
ransomware - search results
If you're not happy with the results, please do another search
LiteSpeed Cache Plugin XSS Flaw Exposes 4M+ Million Sites to Attack
A critical vulnerability has been discovered in the LiteSpeed Cache plugin, a popular WordPress plugin installed on over 4 million websites.
This flaw, identified...
Hackers Attacking Online Ticket Booking Users Using Weaponized PDF Files
Threat actors use weaponized PDF files to exploit software vulnerabilities, enabling them to execute malicious code on a target system.
PDFs provide a common and...
CyberSec Firm i-Soon Leak Exposes The Tools Used By Chinese Hackers
A cybersecurity company data breach could be extremely damaging as it not only compromises sensitive client information but also corrupts the trust in the...
Five Eyes Agencies Exposes Russian APT29 Cloud Attack Tactis
In a groundbreaking advisory, cybersecurity agencies from the Five Eyes intelligence alliance have detailed the sophisticated tactics, techniques, and procedures (TTPs) employed by APT29,...
Hackers Use Steganography Methods To Hide Malware In PNG File
Threat actors employ steganography to hide malicious payloads in benign files such as pictures or documents.
By using this secret tool, threat actors are able...
SubdoMailing – Hackers Abuse 13,000 Subdomains of Popular Brands
In a seemingly impossible act, nearly 8000 domains were discovered to be compromised by threat actors for malicious scam campaigns sending millions of emails...
NIST Cybersecurity Framework 2.0 Published : First Major Update Since Created
The newly updated Cybersecurity Framework (CSF 2.0) offers simplified cybersecurity guidance designed for everyone, from small nonprofits to large corporations.
The Cybersecurity Framework (CSF) underwent...
LockBit Making A Comeback After The Massive Takedown
The notorious ransomware group LockBit has re-emerged on the dark web, signaling a swift comeback less than a week after a significant disruption by...
21 Newly Uncovered Malware Variants Attacks MacOS Users
The "Security 360: Annual Trends Report 2024" provides a comprehensive overview of the evolving cybersecurity landscape, focusing on device risks, application risks, malware and...
Hackers Poison SEO Results To Deploy Gootloader Malware And Steal RDP Access
Hackers poison the SEO results to manipulate search engine rankings by misdirecting users to malicious sites.
They aim to take advantage of the vulnerabilities, inject...