Lumma Stealer Targets Transportation Companies
Hackers appear targeting logistics and transportation companies in North America with Lumma…
Common Types of Cyber Attacks
Cyber attack technologies have grown increasingly sophisticated, targeting any website where vulnerabilities…
Whaling Phishing
Malicious actors know executives and high-level employees, such as public spokespersons, are…
IP Stresser & DDoS Booter
The toolkit of cybersecurity specialists in companies does not consist only of…
Cisco Talos Warns of a Massive Brute Force Wave
The Cisco Talos security team has released information about a new campaign…
UnitedHealth Hack Leaks 6 TB of User Data
UnitedHealth Group, one of the largest providers of health insurance and health…
PyPI Malware Spreading Outbreak Exploits Typosquatting
PyPI, an index of Python packages, once again became a place for…
STRRAT and Vcurms Malware Abuse GitHub for Spreading
A new phishing campaign has recently been discovered that uses GitHub to…
Fujitsu Hacked, Warns of Data Leak Possibility
Fujitsu, one of the world's leading IT companies, reports uncovering the hack…
BianLian Exploits TeamCity Vulnerability to Deploy Backdoors
BianLian, a group of cybercriminals known for their ransomware attacks, recently caught…
MIT Hacked, Students’ Data Sold on the Darknet
On February 13, 2024, a post on a Darknet forum appeared, offering…
Third Ivanti VPN Vulnerability Under Massive Exploitation
Experts have discovered a third Server Side Request Forgery (SSRF) vulnerability in…