Critical WP-Automatic Flaw Threatens Sites
A severe security flaw in the WP-Automatic plugin for WordPress, known as CVE-2024-27956, has been actively exploited by threat actors, posing a critical...
Read moreA severe security flaw in the WP-Automatic plugin for WordPress, known as CVE-2024-27956, has been actively exploited by threat actors, posing a critical...
Read moreReddit recently experienced a major global outage that prevented users worldwide from accessing the platform's websites and mobile apps. During...
Read moreThe Cybersecurity and Infrastructure Security Agency (CISA), a branch of the Department of Homeland Security, is proactively addressing the escalating...
Read more
Passwords are the primary method of authentication for most online accounts, including email, social media, banking, and shopping accounts.
Read moreHow to protect your online privacy? Use a different password for every account, and make sure that each password is long and complex.
Read moreEarth Freybug is a cyberthreat group that has been active since at least 2012 that focuses on espionage and financially...
Winter Vivern is a cyberespionage group to have been active since at least 2020 and it targets governments in Europe...
Volt Typhoon has been active since at least 2021 and primarily targets U.S government and defense organizations for intelligence-gathering purposes.
The BlackSuit ransomware operation emerged in early April/May of 2023. The group is a multi-pronged extortion outfit, encrypting and exfiltrating...
Cisco Talos recently uncovered a new threat actor known as "CoralRaider," suspected to originate from Vietnam and motivated by financial...
Earth Freybug is a cyberthreat group that has been active since at least 2012 that focuses on espionage and financially...
Also known as vulnerability assessment, a vulnerability analysis is a systematic examination of an information system or product to determine the adequacy of security...
Stealth viruses are a type of computer virus that actively attempts to hide its presence and activities on an infected...
Web skimming attacks, also known as formjacking, occur when malicious script is injected into sites to steal information entered into...
BIFROSE malware are backdoors that often arrive on systems either downloaded by users when visiting malicious sites or downloaded by...
Bitfrost collects the victim's hostname, IP address, and process IDs, then uses RC4 encryption to secure it before transmission to...
It is a computer worm that infected over ten million Windows personal computers. It started spreading as an email message...