Global Police Operation Shuts Down 600 Cybercrime Servers Linked to Cobalt Strike

A coordinated law enforcement operation codenamed MORPHEUS has felled close to 600 servers that were used by ...

Twilio’s Authy App Breach Exposes Millions of Phone Numbers

Cloud communications provider Twilio has revealed that unidentified threat actors took advantage of an unauthenticated ...

New RUSI Report Exposes Psychological Toll of Ransomware, Urges Action

A recent report by the Royal United Services Institute (RUSI) emphasized the need for all incident response stakeholders ...

RCE, DoS Exploits Found in Rockwell PanelView Plus: Patch Now

Microsoft has exposed two significant vulnerabilities in Rockwell Automation’s PanelView Plus devices that could ...

Secator: Open-Source Pentesting Swiss Army Knife

Secator is an open-source task and workflow runner designed for security assessments to streamline the use of various ...

Vulnerabilities in CocoaPods: The Achilles’ Heel of the Apple App Ecosystem

Recent discoveries have unveiled severe vulnerabilities within CocoaPods, a dependency manager essential for iOS and ...

New Ransomware Group Uses Phone Calls to Pressure Victims, Researchers Say

Researchers have identified a new ransomware group called Volcano Demon responsible for two recent successful attacks on ...

Understanding the FakeBat Loader: Distribution Tactics and Cybercriminal Infrastructure

In the early part of 2024, the FakeBat loader, also known as EugenLoader or PaykLoader, emerged as a significant threat ...

1 149 150 151 152 153 154 155 156 157 158 159 664