Security News

Security NewsNews

Warner Music Group websites hacked for almost 5 months

Several online stores of the Warner Music Group (WMG) were compromised and what appears to be web skimmers were installed.

Read More
Security NewsNews

SharePoint and OneNote Being Used to Harvest Credentials

Following up on a received spam email, researchers from Naked Security have uncovered a phishing scheme designed to gain access

Read More
Security NewsNews

DoS and DDoS Attacks against Multiple Sectors

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of open-source reporting of targeted denial-of-service (DoS) and distributed denial-of-service (DDoS)

Read More
Security NewsNews

Dharma ransomware used in recent attacks

A cyber security firm has reported that a number of recent cyber attacks in Asia are the result of hackers using

Read More
Security NewsNews

More fake Amazon domains identified

X-Force has identified a new squatting campaign used by threat actors to target the media sector. The campaign has a

Read More
Security NewsNews

BLINDINGCAN Remote Access Trojan [HIDDEN COBRA]

The FBI has high confidence that HIDDEN COBRA actors are using malware variants in conjunction with proxy servers to maintain

Read More
Security NewsNews

Joint NSA and FBI Cybersecurity Advisory Discloses Russian Malware Drovorub

The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165, is deploying previously

Read More
Security NewsNews

Phishing Emails Used to Deploy KONNI Malware

KONNI malware is often delivered via phishing emails as a Microsoft Word document with a malicious VBA macro code. The

Read More
Security NewsNews

Fake Security Advisory used in cPanel Phishing Attack

BleepingComputer has analyzed a targeted phishing campaign being reported by cPanel users. The phishing email has a subject line of

Read More
Security NewsNews

New version of Chinese malware named Taidoor has been discovered

This discovery is the result of analytic efforts between the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of

Read More