Exploited Vulnerability Impacts Thousands of Palo Alto Firewalls

According to reports from the Shadowserver Foundation, approximately 6,000 internet-accessible Palo...

By|
Admin
|
2024-04-25

Midnight Blizzard Causes US Government Impact in Microsoft Breach

Microsoft has confirmed its collaboration with CISA on an urgent directive about a cyber threat, as...

By|
Admin
|
2024-04-08

Sophos Report: Cybercriminals Exploit Remote Desktop Protocol in 90% of Cyber Attacks

A recent report by global cybersecurity firm Sophos has highlighted the widespread exploitation of R...

By|
Admin
|
2024-04-06

New Phishing Attacks Unleash StrelaStealer on Over 100 EU and US Organizations

A fresh wave of phishing attacks has been uncovered by cybersecurity researchers, targeting more tha...

By|
Admin
|
2024-03-23

Report: Hundreds of Government Units and Companies in China Compromised by Cyberattacks

China's Ministry of State Security (MSS) issued a warning on Thursday, citing a recent case wher...

By|
Admin
|
2024-03-23

Russian State Hackers Launch Targeted Phishing Campaigns in Global Espionage Efforts

Russian state hackers have been identified in a series of targeted phishing campaigns spanning at le...

By|
Admin
|
2024-03-23

Report: Exploitation of eSIM Vulnerabilities by SIM Swappers for Phone Numbers

According to a report from BleepingComputer, SIM swappers have adapted their tactics to steal phone...

By|
Admin
|
2024-03-16

Stolen Credentials Identified as Primary Risk in X-Force Threat Intelligence Index 2024

The 2024 edition of the IBM X-Force Threat Intelligence Index, compiled by IBM X-Force analysts, ill...

By|
Admin
|
2024-02-23

New Cybersecurity Report from CrowdStrike Shows Cloud Attacks Surge by 75%

The tenth annual Global Threat Report from CrowdStrike provides crucial insights into the evolving t...

By|
Admin
|
2024-02-22