Romania’s Conpet Confirms Data Theft in Qilin Ransomware Attack Recently, Romania’s national oil pipeline operator, Conpet S.A., fell victim to a cyberattack by the Qilin ransomware...
Reynolds Ransomware: A New Threat with Built-in Defense Evasion Component A recent disclosure by cybersecurity researchers has shed light on a new ransomware strain known as...
Reports indicate that state-sponsored hackers have been utilizing Google’s Gemini AI model at various stages of cyber attacks, ranging from initial reconnaissance to post-compromise activities. Hackers...
Cybersecurity experts have long focused on ransomware and encryption as the primary indicators of modern cyberattacks. However, a new report from Picus Labs suggests that attackers...
The Abuse of Employee Monitoring Software for Ransomware Deployment Recent incidents have revealed a concerning trend where threat actors, specifically a member of the Crazy ransomware...
Microsoft Fixes Critical Security Vulnerability in Notepad A serious security flaw in Notepad that could allow remote code execution has been patched by Microsoft. The vulnerability,...
SmarterTools recently confirmed that their network was compromised by the Warlock ransomware gang, also known as Storm-2603, due to an unpatched SmarterMail instance being exploited. The...
Introducing Windows 11 26H1: A New Era for ARM Devices Microsoft recently unveiled Windows 11 26H1, a groundbreaking operating system tailored for devices powered by Snapdragon...
Bloody Wolf Campaign Targets Uzbekistan and Russia with NetSupport RAT The notorious threat actor known as Bloody Wolf has been identified as the perpetrator behind a...
A counterfeit version of the popular archiving software 7-Zip is being distributed through a fake website, leading to the installation of a trojan that transforms the...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.