SIEM as a Service
Home Search

ransomware - search results

If you're not happy with the results, please do another search
LiteSpeed Cache Plugin XSS Flaw Exposes 4+ Million Sites to Attack

LiteSpeed Cache Plugin XSS Flaw Exposes 4M+ Million Sites to Attack

A critical vulnerability has been discovered in the LiteSpeed Cache plugin, a popular WordPress plugin installed on over 4 million websites. This flaw, identified...
Hackers Attacking Online Ticket Booking Users Using Weaponized PDF Files

Hackers Attacking Online Ticket Booking Users Using Weaponized PDF Files

Threat actors use weaponized PDF files to exploit software vulnerabilities, enabling them to execute malicious code on a target system.  PDFs provide a common and...
Cybersec Firm i-Soon Leak Exposes The Tools Used By Chinese Hackers

CyberSec Firm i-Soon Leak Exposes The Tools Used By Chinese Hackers

A cybersecurity company data breach could be extremely damaging as it not only compromises sensitive client information but also corrupts the trust in the...
Five Eyes Agencies Exposes Russian APT29 Cloud Attack Tactis

Five Eyes Agencies Exposes Russian APT29 Cloud Attack Tactis

In a groundbreaking advisory, cybersecurity agencies from the Five Eyes intelligence alliance have detailed the sophisticated tactics, techniques, and procedures (TTPs) employed by APT29,...
Hackers Use Steganography Methods To Hide Malware In PNG File

Hackers Use Steganography Methods To Hide Malware In PNG File

Threat actors employ steganography to hide malicious payloads in benign files such as pictures or documents.  By using this secret tool, threat actors are able...
SubdoMailing – Hackers Abuse 13,000 subdomains of Popular Brands In Phishing Campaign

SubdoMailing – Hackers Abuse 13,000 Subdomains of Popular Brands

In a seemingly impossible act, nearly 8000 domains were discovered to be compromised by threat actors for malicious scam campaigns sending millions of emails...
NIST Cybersecurity Framework 2.o Published : First Major Update Since Created

NIST Cybersecurity Framework 2.0 Published : First Major Update Since Created

The newly updated Cybersecurity Framework (CSF 2.0) offers simplified cybersecurity guidance designed for everyone, from small nonprofits to large corporations. The Cybersecurity Framework (CSF) underwent...
LockBit Making A Comeback After The Massive Takedown

LockBit Making A Comeback After The Massive Takedown

The notorious ransomware group LockBit has re-emerged on the dark web, signaling a swift comeback less than a week after a significant disruption by...
21 Newly Uncovered Malware Variants Attacks MacOS Users

21 Newly Uncovered Malware Variants Attacks MacOS Users

The "Security 360: Annual Trends Report 2024" provides a comprehensive overview of the evolving cybersecurity landscape, focusing on device risks, application risks, malware and...
Hackers Poison SEO Results To Deploy Gootloader Malware And Real RDP Access

Hackers Poison SEO Results To Deploy Gootloader Malware And Steal RDP Access

Hackers poison the SEO results to manipulate search engine rankings by misdirecting users to malicious sites.  They aim to take advantage of the vulnerabilities, inject...
SIEM as a Service

Recent Posts

SonicWall Firewall Authentication Bypass Vulnerability Exploited in Wild Following PoC Release

A critical authentication bypass vulnerability in SonicWall firewalls, tracked as CVE-2024-53704, is now being actively exploited in the wild, cybersecurity firms warn. The surge in...