Update: New Relic Admits Attack on Staging Systems, User Accounts

Web tracking and analytics company New Relic has disclosed a cyberattack on its staging systems, which were compromised ...

The European Space Agency Explores Cybersecurity for Space Industry

Cybersecurity for space missions is not optional and should be taken seriously. The barrier to entry for threat actors ...

Linux Version of Qilin Ransomware Focuses on VMware ESXi

The Linux encryptor includes extensive command-line options for customization, allowing threat actors to specify ...

HUMAN Satori Threat Intelligence Alert: Account Takeover Attacks Use ScrubCrypt to Deploy RedLine Stealer Malware

Researchers: Gabi Cirlig, Adam Sell, Arik Atar ScrubCrypt is an obfuscation tool threat actors use to help slip malware ...

Opening Critical Infrastructure: The Current State of Open RAN Security

RRHs are usually located close to antennas, often mounted on the cell tower. The BBUs used to be co-located with the ...

US Health Department Urges Hospitals to Patch Critical Citrix Bleed Bug

The U.S. Department of Health and Human Services (HHS) has warned hospitals about the actively exploited Citrix Bleed ...

US Man Jailed 8 Years for SIM Swapping and Apple Support Impersonation

Golshan’s schemes involved SIM swapping, social media account takeovers, Zelle payment fraud, and impersonating Apple ...

TrickBot Developer Pleads Guilty in US Court

Cybercrime , Fraud Management & Cybercrime , Ransomware Vladimir Dunaev Faces Up to 35 Years in Prison David Perera ...

1 463 464 465 466 467 468 469 470 471 472 473 657