A ransomware attack targeting Arizona-based supply chain management software provider Blue Yonder has caused significant disruptions for several high-profile customers
U.S. telecom giant T-Mobile recently announced that it detected and blocked cyber intrusion attempts targeting its systems
Two critical security flaws have been identified in the popular WordPress plugin which could enable unauthenticated attackers to install and activate malicious plugins
The Python Package Index (PyPI) has quarantined the package "aiocpa" after discovering a recent update contained malicious code designed to exfiltrate private keys via Telegram
The U.S. Department of Justice (DOJ) recently announced the disruption and seizure of PopeyeTools, a major online marketplace for trading stolen credit card information
A recent report from Censys has identified over 145,000 internet-exposed Industrial Control Systems (ICS) across 175 countries
Threat actors are adopting a sophisticated attack technique called Ghost Tap to exploit near-field communication (NFC) technology and steal funds from victims at scale
T-Mobile has confirmed being one of the targets in a sweeping cyber-espionage campaign orchestrated by the Chinese threat actor group known as Salt Typhoon
A recent report from the Environmental Protection Agency (EPA)’s Office of Inspector General (OIG) has revealed significant cybersecurity vulnerabilities in over 300 U.S. drinking water systems
A critical security vulnerability, tracked as CVE-2024-10924 with a CVSS score of 9.8, has been identified in the popular WordPress plugin, Really Simple Security
Lichtenstein pleaded guilty to charges of money laundering and hacking, which led to the theft of nearly 120,000 bitcoins
Israeli cybersecurity company ClearSky, found that they leverage a malware known as SnailResin, which then activates a secondary backdoor called SlugResin