Cybersecurity Blog
European Police Hackathon Hunts Down Traffickers
Law enforcers from 26 countries came together recently in a hackathon designed to enhance intelligence gathering on ...
Shadow PC Warns of Data Breach as Hacker Tries to Sell Gamers’ Information
The breach occurred due to a social engineering attack targeting an employee, resulting in the theft of customer data ...
R2R stomping – are you ready to run? – Check Point Research
Research by: Jiri Vinopal Highlights Check Point Research (CPR) introduces a new method for running hidden implanted ...
Malicious NuGet Package Targeting .NET Developers with SeroXen RAT
A malicious package hosted on the NuGet package manager for the .NET Framework has been found to deliver a remote access ...
New WordPress Backdoor Creates Rogue Admin Account to Hijack Websites
The malware has various functions, including user creation, content replacement, and plugin control, allowing attackers ...
Most CISOs confront ransomware — and pay ransoms
The odds of a CISO encountering a major cyberattack are about as high as it can get with 9 in 10 CISOs reporting at ...
Critical SOCKS5 Vulnerability in cURL Puts Enterprise Systems at Risk
The maintainers of the cURL data transfer project on Wednesday rolled out patches for a severe memory corruption ...
Multiple Cybercrime Groups Join in on the Israel-Hamas Conflict | Cyware Hacker News
Several threat actors, including known ones, have joined in on the Israel-Hamas conflict escalation. These groups have ...