Cybersecurity authorities release guidance on how to secure remote access software
The joint guide is designed to help organizations identify and defend against threat actors abusing remote access software.
The joint guide is designed to help organizations identify and defend against threat actors abusing remote access software.
The PowerDrop malware uses advanced techniques to evade detection.
The espionage campaign involves malicious files delivered via email and messaging apps.
The flaw, tracked as CVE-2023-3079, is a type confusion issue within the V8 engine in Google Chrome.
The Clop ransomware gang took responsibility for the attacks.
Microsoft has attributed the attacks to Lace Tempest, a ransomware affiliate that overlaps with other cybercriminal groups such as FIN11, TA505, and Evil Corp.
The threat actors are chaining three vulnerabilities in the Veritas software - CVE-2021-27876, CVE-2021-27877 and CVE-2021-27878.
Threat actors have been observed exploiting sites running Magento, WooCommerce, WordPress, and Shopify digital commerce platforms.
The largest known individual theft so far involved almost $8 million in USDT (Tether).
The world in brief: MOVEit zero-day mass exploited in data stealing attacks, 250+ Gigabyte motherboard models come with firmware backdoor, and more.
Showing elements 1921 - 1930