Experts at Zscaler ThreatLabz have identified significant modifications in the functionality of the malicious software PikaBot. The new version, labeled 1.18.32, is currently undergoing a development and testing phase, during which the developers have...
In November 2023, the Indian conglomerate Infosys, a global titan in software provision, precipitated a widespread data breach that implicated Bank of America’s clientele. An official statement released on November 3rd revealed that the...
Cybersecurity specialists have identified a vulnerability in the implementation of the Rhysida ransomware, which allowed the decryption keys to be recovered and the data locked by the malware to be decrypted. This discovery was...
Hackers are exploiting a Server-Side Request Forgery (SSRF) vulnerability in Ivanti Connect Secure (ICS), Policy Secure (IPS), and ZTA products to deploy a new backdoor named DSLog on vulnerable devices. The flaw, identified as...
In Romania, a minimum of 25 hospitals have faced severe operational challenges due to a vast ransomware assault, which has debilitated the local healthcare management system. The Hipocrate Information System (HIS), employed by Romanian...
According to the latest reports by journalists from TechCrunch, a spyware application for Android named TheTruthSpy, openly available for download, is riddled with vulnerabilities. This flaw exposes data from tens of thousands of devices...
The United States Department of Justice has announced the seizure of online infrastructure utilized for the sale of a Remote Access Trojan (RAT) named Warzone RAT, including the confiscation of four domains, one of...
According to a joint warning issued on February 7th by the United States Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and the Federal Bureau of Investigation (FBI), the Chinese hacking...
Cybersecurity experts at Check Point have unearthed yet another variant of the Raspberry Robin worm, initially identified in 2021. This trojan is distinguished by its high degree of adaptability and the sophistication of its...
CrowdStrike has unveiled that the architects behind the HijackLoader loader have integrated novel evasion tactics, as this malicious software increasingly becomes a tool of choice for cybercriminals to deploy additional payloads and tools. The...
Cybersecurity experts at McAfee have discovered a new iteration of the malicious XLoader software, capable of autonomously initiating on infected Android smartphones upon installation. This revelation poses a significant threat to users across the...
Specialists at Kaspersky Lab have uncovered the Coyote banking trojan, targeting users of over 60 financial institutions, predominantly in Brazil. This malware distinguishes itself through a complex infection chain that employs various advanced technologies,...
Amidst Apple’s positioning of its App Store as a bastion of security and reliability, the company encountered a formidable threat to its reputation: a fraudulent application, masquerading as LastPass, found its way into the...
A Chinese cyber-espionage group has breached the computer network of the Dutch armed forces by exploiting a vulnerability in Fortinet FortiGate devices. According to the Netherlands Military Intelligence and Security Service (MIVD), the compromised computer...
Cracking BitLocker’s protection in just 43 seconds using equipment costing less than $10 has become feasible, casting doubt on the reliability of one of the most popular hard drive encryption methods in the Windows...
Analysts at Palo Alto Networks have issued a warning about the banking trojan Mispadu, exploiting a recent vulnerability to bypass Windows SmartScreen and compromise users in Mexico. This malware variant, identified in 2019, has...