Hospital IT Desks Under Siege: Cybercriminals Deploy Voice Call Intrusions
Hospitals battle sophisticated IT desk cyberattacks. HC3 reports a rise in social engineering threats. Robust verification and training are essential…
Massive Breach at boAt Exposes Millions of Customer Data Records
boAt data breach exposes 7.5 million customers. Personal information leaked includes names, addresses, more. Customers now at risk of identity…
Resilient QakBot Malware Resurfaces with Stealthier Persistence Technique
QakBot evades takedown, infects systems anew. Phishing campaigns employ tax season themes. Windows restore points used for malware persistence.
High-Stakes Legal Battle: Splunk Sues Cribl Over Alleged Copyright Infringement
Cisco-acquired Splunk sues Cribl over IP infringement. Former Splunk executive leads defendant Cribl in the case. Case outcome could influence…
GitLab Exploits Open Door for Cyber Criminals Targeting Financial Sector
JSOutProx employs stealth tactics in financial cyberattacks. GitLab vulnerabilities enable unauthorized code access. Incident response teams are actively mitigating threats.
Experts Warn of Escalating Cyber Threats and Vulnerabilities
Experts raise alarm over growing cyber threats. Innovative malware targets diverse sectors. Vulnerabilities exploited in popular platforms.
Notepad++ Users Beware: Popular Plugin Hacked to Launch Cyber Attacks
ASEC uncovers altered Notepad++ plugin "mimeTools.dll". Malicious shell code embedded in "certificate.pem" file. IoCs reveal malware signatures and C&C server…
Weaponized PDFs Deliver Stealthy Byakugan Malware
PDFs are exploited for malware delivery. Byakugan malware employs advanced evasion. Understanding IoCs is critical for defense.
Chinese Espionage Groups Attack Ivanti VPNs with Advanced Tactics
Mandiant exposes Chinese hacking activities targeting VPNs. New malware and tactics threaten global cybersecurity. Proactive defense measures are crucial for…
Exploit Discovered in Magento Ecommerce Platform Endangers Online Transactions
Magento's vulnerability allows backdoor insertion. Attackers use XML code to steal customer data. Immediate action and updates are crucial for…