Cybersecurity Blog
10-Year-Old ‘RUBYCARP’ Romanian Hacker Group Surfaces with Botnet
Apr 09, 2024NewsroomBotnet / Crypto Mining A threat group of suspected Romanian origin called RUBYCARP has been ...
Professionally Hooked: Microsoft Two-Step Phishing Campaign Targets LinkedIn Users – Perception Point
The Rise of Social Media as a Browser Security Challenge In the modern workspace the lines between professional and ...
Hackers Targeting Human Rights Activists in Morocco and Western Sahara
Apr 09, 2024NewsroomCyber Espionage / Malware Human rights activists in Morocco and the Western Sahara region are the ...
US Health Deptarment Warns Hospitals of Hackers Targeting IT Help Desks
The U.S. Department of Health and Human Services (HHS) warns that hackers are now using social engineering tactics to ...
Researchers Discover LG Smart TV Vulnerabilities Allowing Root Access
Apr 09, 2024NewsroomVulnerability / IoT Security Multiple security vulnerabilities have been disclosed in LG webOS ...
CL0P’s Ransomware Rampage – Security Measures for 2024
2023 CL0P Growth Emerging in early 2019, CL0P was first introduced as a more advanced version of its predecessor the ...
Hackers Deploy Crypto Drainers on Thousands of WordPress Sites
According to cybersecurity researcher MalwareHunterTeam, the threat actors have now begun monetizing the pool of ...
Patches for CVE-2024-1086 for CloudLinux 6h, 7 Users on KernelCare Live
Update April 8th, 2024: Updated ETA for CloudLinux 6h and CloudLinux 7. The KernelCare team is working on deploying a ...