Three individuals in the United States have been accused by federal prosecutors of hacking into the networks of five U.S. companies using BlackCat ransomware between May...
Recent reports from the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed that a critical privilege escalation vulnerability in the Linux kernel is currently being exploited...
The Rise of AdaptixC2: A Look into the Emerging Threat Landscape The underground world of cyber threats is evolving rapidly, with the AdaptixC2 command-and-control (C2) framework...
A recent discovery has unveiled the Qilin ransomware operation’s tactics of executing Linux encryptors within Windows using the Windows Subsystem for Linux (WSL) to avoid detection...
Hackers Exploit Velociraptor DFIR Tool in Ransomware Attacks Cybercriminals have been found exploiting Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in ransomware attacks...
Microsoft recently revealed that it invalidated over 200 certificates utilized by a threat actor identified as Vanilla Tempest to falsely sign malicious files in ransomware assaults....
Three well-known ransomware groups, DragonForce, LockBit, and Qilin, have recently formed a strategic alliance to enhance their ransomware operations, reflecting ongoing changes in the cybersecurity landscape....
Every week, the cyber world reminds us that silence doesn’t mean safety. Attacks often begin quietly — one unpatched flaw, one overlooked credential, one backup left...
Microsoft Attributes Medusa Ransomware Deployment to Storm-1175 Group Exploiting Fortra GoAnywhere Vulnerability On Monday, Microsoft revealed that the Storm-1175 threat actor group exploited a critical security...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.