Law enforcement is suspected to be behind the recent outage of ALPHV ransomware gang’s websites. The negotiation and data leak sites, as well as the Tor negotiation URLs, have been down for over 30 hours.
Both bugs were found this summer in Qlik Sense — a data analytics tool used widely among government organizations and large businesses. The vulnerabilities provide hackers with an entry point into systems and allow them to elevate their privileges.
The North Korean threat group uses a backdoor to steal information and execute commands on compromised systems. Kimsuky has expanded its attacks to include Europe, Russia, and the US.
The vulnerability occurs when password managers get disoriented and mistakenly autofill credentials into the native fields of the underlying app instead of the intended login page.
The Akira ransomware group has targeted two more victims, one in Italy and another in Curaçao, compromising sensitive data and posing a threat to the integrity and security of the affected companies.
The U.S. Department of Health and Human Services (HHS) has released a concept paper outlining a cybersecurity strategy for the healthcare sector, focusing on strengthening resilience against cyber-attacks.
Data breaches in the U.S. have reached an all-time high, with 2.6 billion personal records compromised in the past two years, driven by aggressive ransomware attacks and breaches targeting third-party vendors.
Russian APT28 hackers, also known as Fancy Bear, exploited a Microsoft Outlook zero-day vulnerability to target European NATO member countries, including a NATO Rapid Deployable Corps.
Understanding human vulnerabilities and the ways in which attackers manipulate emotions and fundamental traits is crucial for identifying and responding to cybersecurity threats.
The default configuration of Microsoft Dynamic Host Configuration Protocol (DHCP) servers leaves a significant number of organizations vulnerable to these attacks, making them accessible to a wide range of attackers.