A high-severity vulnerability plaguing old Cisco routers is being used to build a malicious, global botnet, experts have warned. Cybersecurity researchers Sekoia published an in-depth report on the ...
Thousands of Asus routers are currently ensnared by a new botnet that is trying to disable Trend Micro security features before exploiting vulnerabilities for backdoor access.… Threat monitoring ...
A cryptocurrency is a digital form of money. They are digital assets created to be used to pay for goods and services. Cryptocurrencies can be used as a store of value, unit of account and medium of ...
The hackers were seen actively monitoring cyber threat intelligence to discover and rebuild exposed infrastructure. At least 230 individuals were targeted by North Korean hackers in fake ...
Governments can't get enough of hacking services to use against their citizens, despite their protestations that elements of the trade need sanctioning. Only legitimate government agencies are ...
A new self-replicating malware infects the NPM repository. Microsoft and Cloudflare disrupt a Phishing-as-a-Service platform. Researchers uncover a new Fancy Bear backdoor campaign. The VoidProxy ...
Cybersecurity researchers have discovered a variant of a recently disclosed campaign that abuses the TOR network for cryptojacking attacks targeting exposed Docker APIs. Akamai, which discovered the ...
Google Cloud's Mandiant Consulting has revealed that it has witnessed a drop in activity from the notorious Scattered Spider group, but emphasized the need for organizations to take advantage of the ...
You can create a release to package software, along with release notes and links to binary files, for other people to use. Learn more about releases in our docs.
A relatively new threat group, Interlock, has gained traction in 2025 as an opportunistic ransomware operator. In this press release, Arctic Wolf examines Interlock’s most common attack methods and ...