Cyber Security
A hacking group used the Conti’s leaked ransomware source code to create their own ransomware to use in cyberattacks against Russian organizations. While it...
Hi, what are you looking for?
Bureaucracy and dispersed authorities hinder the Cybersecurity and Infrastructure Security Agency’s ability to carry out its mission as network cyber lead, according to an...
Agency resources are intended to address the longstanding challenges health systems and hospitals have faced from increasingly advanced cyberattacks. The Cybersecurity and Infrastructure Security...
In recent findings from Check Point Research, a significant phishing attack targeting more than 40 prominent Colombian companies has been uncovered. The attackers behind this campaign...
A hacking group used the Conti’s leaked ransomware source code to create their own ransomware to use in cyberattacks against Russian organizations. While it...
A new Android banking malware named Octo has appeared in the wild, featuring remote access capabilities that allow malicious operators to perform on-device fraud....
A third member of the FIN7 cybercrime gang has been sentenced for his role in a scheme that targeted hundreds of companies with payment...
Developers have patched a popular Ruby library for parsing and converting AsciiDoc files to safeguard servers against a newly discovered command injection vulnerability. Command...
Virtualization software vendor VMware has released patches addressing critical web security vulnerabilities in several of its products. The updates, released today (April 7), include...
A security researcher claims they netted $36,000 in bug bounties after uncovering critical HTTP request smuggling vulnerabilities affecting three of Apple’s core web applications. The...
German police have seized servers powering the infamous darknet marketplace Hydra and confiscated the equivalent of $25 million in bitcoin as part of a...
Microsoft and CISA have warned of ‘Spring4Shell’ exploitation in the wild. As previously reported by The Daily Swig, in the past week, Spring Framework developers have released...
Two companies are embarking on a fresh agreement to help pave the way toward JADC2. Northrop Grumman Corporation and AT&T unveiled joint plans on...
Trend Micro has advised customers to update its Apex Central technology following the discovery of web-based attacks targeting a newly discovered vulnerability. Both hosted and on-premises...
Recent Comments