Cyber Security
Attackers have developed the Mozi botnet so that the malware can achieve persistence on routers and network gateways. Mozi is a peer-to-peer botnet, active for two...
Hi, what are you looking for?
Attackers have developed the Mozi botnet so that the malware can achieve persistence on routers and network gateways. Mozi is a peer-to-peer botnet, active for two...
FILE – In this Feb. 21, 2019, file photo, people stand in front of the logo of AXA Group prior to the company’s 2018...
The zero-day vulnerability used to breach on-premise Kaseya VSA servers was in the process of being fixed, just as the REvil ransomware gang used...
Cybersecurity agencies from the US and UK have released a joint statement condemning Russian government-backed hackers for allegedly conducting brute-force cyber-attacks against businesses and organizations worldwide....
Customers of networking solutions products made by Zyxel have been warned that a “sophisticated” threat actor is actively targeting its firewalls and VPNs. In a screenshot...
A Georgia-based fertility clinic has disclosed a data breach after files containing sensitive patient information were stolen during a ransomware attack. Reproductive Biology Associates,...
The US Department of Justice (DoJ) has seized more than $2.3 million in bitcoin that was allegedly destined to line the pockets of those...
Radware’s recently released “Quarterly DDoS Attack Report, which provides an overview of attack activity witnessed during the first quarter of 2021, found that while...
The most popular open source repositories are rife with misconfigurations that leave countless downstream applications at risk from dependency confusion attacks, security researchers have discovered. Of...
To prevent crippling attacks, private firms that control critical infrastructure must share information with authorities. The six-day shutdown of a key 5,550-mile fuel pipeline earlier this...
Recent Comments