The U.S. Cybersecurity and Infrastructure Security Agency (CISA) announced on Thursday that hackers are targeting Commvault’s cloud applications hosted on Microsoft Azure. According to CISA, ...
By
A recent report from cybersecurity firm Kaspersky has revealed that Russian businesses are being increasingly targeted by a phishing campaign spreading a remote access trojan ...
By
Cybersecurity researchers have identified a new cryptojacking campaign called RedisRaider, which targets exposed Redis servers running Linux. According to researchers Matt Muir and Frederic Baguelin ...
By
Since February 2024, an unknown hacker group has been creating harmful Chrome browser extensions. These extensions look like useful tools as productivity apps, VPNs, or ...
By
A new malware is gaining traction among ransomware actors for post-exploitation activities. Threat actors are using a malware called Skitnet to siphon off sensitive data ...
By
Introduction: When Fitness Goals Met Cyber Risks In 2018, while millions of people were tracking their calories and logging workout routines with MyFitnessPal, a silent ...
By
Looking for a Luxury Bag? Dior Just Dropped One… Full of Customer Data! If you’ve recently been shopping for a luxury handbag, Dior might have ...
By
A recent proof-of-concept (PoC) shows how the Linux io_uring interface can be used to avoid system call-based detection methods. The io_uring asynchronous I/O performance feature ...
By
You get a call from an unknown number, thinking it’s just another unknown call. But that could be a phishing attempt. In the wake of ...
By
Cloud computing has revolutionized companies’ business by offering scalable, on-demand access to computing resources. Infrastructure as a Service (IaaS) provides the most excellent control and ...
By