Cybersecurity

Cleo File Transfer Vulnerability Under Exploitation – Patch Pending, Mitigation Urged

î ‚Dec 10, 2024î „Ravie LakshmananVulnerability / Threat Analysis Users of Cleo-managed file transfer software are being urged to ensure that their instances are not exposed...

3AM Ransomware: What You Need To Know

What is 3AM?3AM (also known as ThreeAM) is a ransomware group that first emerged in late 2023. Like other ransomware threats, 3AM exfiltrates...

Termite-Bande bekennt sich zu Blue Yonder-Hack

DC Studio – Shutterstock.com Die Ransomware-Gruppe Termite hat jetzt die Verantwortung für den Angriff beim Software-as-a-Service (SaaS)-Anbieter Blue Yonder im November übernommen. Auf ihrer...

Ongoing Phishing and Malware Campaigns in December 2024

î ‚Dec 10, 2024î „The Hacker NewsMalware Analysis / Cyber Threat Cyber attackers never stop inventing new ways to compromise their targets. That's why organizations must...

Black Basta Ransomware Evolves with Email Bombing, QR Codes, and Social Engineering

î ‚Dec 09, 2024î „Ravie LakshmananThreat Intelligence / Malware The threat actors linked to the Black Basta ransomware have been observed switching up their social engineering...

North Korean hackers masquerade as remote IT workers and venture capitalists to steal crypto and secrets

In its lust for stealing cryptocurrency and sensitive information, North Korean hackers are disguising themselves as remote IT workers, recruiters, and even venture...

Recent Articles