In a recent cyber breach, hackers have laid claim to penetrating a prominent multi-billion dollar auction house’s network. Their audacious offer? Selling the access…
Initial Access Broker
Ukraine claims Russian hackers are using the latest Somnia ransomware.
The Russian hacktivists introduced a new ransomware strain called Somnia that hit Multiple Ukrainian enterprises and encrypted their computers and disrupted operations. In a…
Cybercriminals Use Two PoS Malware to Steal Over 167,000 Credit Cards
A threat actor has used two point-of-sale (PoS) malware variants to collect details about more than 167,000 credit cards from payment terminals. Cybercriminals use…
Mitel VoIP Systems are Used by Lorenz Ransomware to Breach Business Networks
A now-patched significant security hole in Mitel MiVoice Connect has been used by the Lornenz ransomware operations. The operators used it to gain access…
Malware, Attack Risks Warned to LA School District
A Ransomware Gang from Vice Society Also Takes Credit for the malware attack. The fact that the malware attack against the Los Angeles Unified…
Cisco Hacked By Yanluowang Ransomware Gang, 2.8GB Allegedly Stolen
Cisco confirmed today that the Yanluowang ransomware group breached its corporate network in late May and that the actor tried to extort them under…
Vmware Horizon servers continue to be exploited through log4j vulnerability
Attackers continue to target VMware Horizon servers, which many organizations use to securely access enterprise apps for remote workers. Attackers are exploiting the critical…
Log4j vulnerability targets SolarWinds, ZyXEL devices
SolarWinds and ZyXEL devices are being attacked by cybercriminals who are searching for Log4jShell vulnerability aka log4j vulnerability. The devices are known to contain…
Microsoft OneNote files are used in new QakNote attacks to spread QBot malware.
Since the end of last week, a new QBot malware campaign known as “QakNote” has been spotted in the wild. This campaign infects computers…
Sites That Leak Ransomware Encourage More Attacks
Victims Are Frequently Attacked at the Same Time by Several Ransomware Groups Being posted on a ransomware leak website isn’t just embarrassing; it could…