[ad_1] A Yandex source code repository allegedly stolen by a former employee of the Russian tech company has been leaked as a torrent on a popular hacking forum. Yesterday the leaker posted a magnet link which it says are "Yandex…
[ad_1] Google's Threat Analysis Group has terminated tens of thousands of accounts linked to a group known as "Dragonbridge" or "Spamouflage Dragon" which spreads pro-China disinformation on several online platforms. According to Google, Dragonbridge is obtaining new Google Accounts from…
[ad_1] The UK's National Cyber Security Center (NCSC) has issued a warning against Russian and Iranian hackers who are increasingly targeting organizations and individuals. Specifically, the country's cybersecurity agency has identified a spike in spear-phishing attacks attributed to tracked threat…
[ad_1] Operation Hive ransomware's Tor payment and data leak sites were seized in an international law enforcement operation after the FBI infiltrated the gang's infrastructure last July. Today, the United States Department of Justice and Europol announced that an international…
[ad_1] Today, Hive Tor ransomware payment and data leak sites were seized in an international law enforcement operation involving the US Department of Justice, FBI, Secret Service, Europol and the German companies BKA and Polizei. The notice of seizure on…
[ad_1] Proof-of-concept exploit code has been released by Akamai researchers for a critical Windows CryptoAPI vulnerability discovered by the UK's NSA and NCSC allowing MD5 crash certificate spoofing. Tracked as CVE-2022-34689, this security flaw was patched with security updates released…
[ad_1] Hackers exploited critical remote code execution vulnerability in Realtek Jungle SDK 134 million attacks attempting to infect smart devices in the second half of 2022. Exploited by multiple threat actors, the vulnerability is identified as CVE-2021-35394 and is associated…
[ad_1] CISA, NSA and MS-ISAC today warned in a joint advisory that attackers are increasingly using legitimate remote monitoring and management (RMM) software for malicious purposes. More worryingly, CISA has uncovered malicious activity within the networks of several federal civilian…
[ad_1] Hackers exploited critical remote code execution vulnerability in Realtek Jungle SDK 134 million attacks attempting to infect smart devices in the second half of 2022. Exploited by multiple threat actors, the vulnerability is identified as CVE-2021-35394 and is associated…
[ad_1] Threat actors are auctioning off alleged source code for Riot Game's League of Legends and anti-cheat software Packman, confirmed to have been stolen in a recent hack of the game company's development environment . Last Friday, Riot Games revealed…
Recent Posts
- ‘Evil Telegram’ Android apps on Google Play infected 60K with spyware
- Google rolls out Privacy Sandbox to use Chrome browsing history for ads
- Microsoft Teams phishing attack pushes DarkGate malware
- The Week in Ransomware – September 8th 2023
- Notepad++ 8.5.7 released with fixes for four security vulnerabilities
Recent News
-
Hackers steal Steam accounts in new…
September 13, 2022 -
New PsExec spin-off allows hackers to…
September 13, 2022 -
Hackers hack software provider for Magento…
September 13, 2022
Work Together
Let us help you protect your business from all malware, spyware and ransomware attacks.