Vulnerable devices for research are being used as a bait for hackers
Researchers set up 320 honeypots to see how quickly threat actors would target open cloud services, and found that 80% of them were hacked...
Italian threat actors manifested why we should not trust our printers
A group of Italian academics has put together a set of three attacks known as 'Printjack,' which warns users of the dangers of trusting...
What did the researchers found out about RatDispenser?
According to HP Threat Research, the actors behind RATDispenser may be using a Malware-as-a-Service (MaaS) architecture to transmit eight malware families.
STRAT, WSHRAT, AdWind, Formbook,...
Why should you update your VMware devices?
VMware has released patches for two security flaws in vCenter Server and Cloud Foundation that might be exploited by a remote attacker to obtain...
Here is why you need to keep updating your system security
A threat actor notorious for targeting targets in the Middle East has improved its Android spyware, allowing it to be stealthier and more persistent...
Ikea has launched a “full-scale inquiry” after an email-based cyber intrusion
Ikea has revealed that it is dealing with a cyber assault on its networks, with evidence indicating that its Microsoft Exchange servers may have...
1,000 threat actors across 20 nations have been arrested by Interpol
In a worldwide operation on cybercrime, Interpol claims to have detained over 1,000 people and recovered more than $27 million in illicit money. The...
The UK regulator is expected to reject the Facebook-Giphy merger
According to the Financial Times, Meta — the firm formerly known as Facebook — is expected to have a big acquisition rejected by the...
Nirmala Sitharaman: India has no intention to accept Bitcoin as a currency
Indian Finance Minister, Nirmala Sitharaman informed the Lok Sabha on the opening day of the winter session of the parliament that the national government...
Hackers are mining cryptocurrency exploiting hacked Google Cloud accounts
Cyber attackers are abusing Google Cloud Platform (GCP) instances with a lack of security to download cryptocurrency mining software to infected systems, as well...



















