Sitemap
Pages
Posts by category
- Category: Cybercrime
- Category: Carding
- Category: Darkweb
- Australian Man Sentenced for Selling Ecstasy on the Darkweb
- Brave Browser Leaked DNS Queries for Onion Services
- Australian Border Force Seizes Meth Inside a Stuffed Llama
- New Change to German Postal Law Targets Internet Drug Trade
- Dream Market Vendor “Rackjaw2” Sentenced to Prison
- Feds Traced Bitcoin Transactions to a Drug Dealer’s Apartment
- Facebook Sponsors 0day Exploit For Tails OS To Help The FBI Catch A Pedophile
- Category: Fraud
- Category: Ransomware
- The ransomware landscape changes as fewer victims decide to pay
- Another ransomware payment recovered by the Justice Department
- Elden Ring maker Bandai Namco hit by ransomware and data leaks
- North Korean APT targets US healthcare sector with Maui ransomware
- AstraLocker 2.0 ransomware isn’t going to give you your files back
- Conti ransomware group’s pulse stops, but did it fake its own death?
- ALPHV squeezes victim with dedicated leak site for employees and customers
- BlackBasta is the latest ransomware to target ESXi virtual machines on Linux
- Ransomware Task Force priorities see progress in first year
- Ransomware attack turns 2022 into 1977 for Somerset County
- Eerie GoodWill ransomware forces victims to publish videos of good deeds on social media
- Chicago students lose data to ransomware attackers
- Category: The Deep Web
- Category: Hackers
- Category: Attacks
- Emotet Malware Makes a Comeback with New Evasion Techniques
- Chinese Hackers Utilize Golang Malware in DragonSpark Attacks to Evade Detection
- Gamaredon Group Launches Cyberattacks Against Ukraine Using Telegram
- Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North Africa
- Earth Bogle Campaign Unleashes NjRAT Trojan on Middle East and North Africa
- Hackers Can Abuse Legitimate GitHub Codespaces Feature to Deliver Malware
- Hackers Can Abuse Legitimate GitHub Codespaces Feature to Deliver Malware
- New Backdoor Created Using Leaked CIA’s Hive Malware Discovered in the Wild
- Cacti Servers Under Attack as Majority Fail to Patch Critical Vulnerability
- Beware: Tainted VPNs Being Used to Spread EyeSpy Surveillanceware
- IcedID Malware Strikes Again: Active Directory Domain Compromised in Under 24 Hours
- Rackspace Confirms Play Ransomware Gang Responsible for Recent Breach
- The FBI’s Perspective on Ransomware
- RedZei Chinese Scammers Targeting Chinese Students in the U.K.
- Hackers Breach Okta’s GitHub Repositories, Steal Source Code
- Zerobot Botnet Emerges as a Growing Threat with New Exploits and Capabilities
- Authorities Seize Dark-Web Site Linked to the Netwalker Ransomware
- Category: Breaches
- Attacks Erase Western Digital Network-Attached Storage Drives
- Mailchimp Suffers Another Security Breach Compromising Some Customers’ Information
- Malware Attack on CircleCI Engineer’s Laptop Leads to Recent Security Incident
- Twitter Denies Hacking Claims, Assures Leaked User Data Not from its System
- Mitigate the LastPass Attack Surface in Your Environment with this Free Tool
- Category: Phishing
- Category: Attacks
- Category: Malware
- Category: Malware Analysis
- Chinese government hackers attack Russian companies for the first time
- Rare UEFI Malware Found in the wild Kaspersky says
- How the Trickbot C2 uses rDNS to disguise as a legitimate Australian government service
- IcedID Malware Updates new techniques To Avoid Detection
- New Info Stealer Poulight From The Russian Underground
- Category: Threats
- Forced Chrome extensions get removed, keep reappearing
- ASyncRat surpasses Dridex, TrickBot and Emotet to become dominant email threat
- Credential-stealing malware disguises itself as Telegram, targets social media users
- Don’t let scammers ruin your Valentine’s Day
- SolarWinds attackers launch new campaign
- Smoking Out a DARKSIDE Affiliate’s Supply Chain Software Compromise
- The UNC2529 Triple Double: A Trifecta Phishing Campaign
- UNC2447 SOMBRAT and FIVEHANDS Ransomware: A Sophisticated Financial Threat
- Abusing Replication: Stealing AD FS Secrets Over the Network
- Ghostwriter Update: Cyber Espionage Group UNC1151 Likely Conducts Ghostwriter Influence Activity
- Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
- Category: Malware Analysis
- Category: Security
- Category: Cloud Security
- Crawl, Walk, Run: Operationalizing Your IaC Security Program
- How To Prevent the IaC Misconfiguration Snowball Effect
- Prevent Secret Leaks: Find and Secure Secrets Across Your Repositories and Pipelines
- You Must Comply! Why You Need Proactive Open-Source License Compliance
- Infrastructure as Code Security and AppSec: Streamlined DevSecOps From App to Infra
- Prisma Cloud Provides New Extensive Use Cases for Azure Customers
- 6 Key Kubernetes DevSecOps Principles: People, Processes, Technology
- 9 Essential Infrastructure Security Considerations for Kubernetes
- Software Composition Analysis (SCA): How Does It Help Keep Cloud Applications Secure?
- Web Application Firewalls (WAFs): What You Need To Know About the Security Checkpoint for Your Web Application
- Building the Business Case for DevSecOps
- What is Infrastructure as Code? The Best Way to Fully Control Your Cloud Configuration
- Category: Crypto
- Gobitdex CEO helps startups affected by SVB collapse
- No business relationship with Signature Bank, says Сhoizebit
- Zaxerbit has raised ‘eight-figure sum’ of investment
- Larbidex unveils World ID protocol
- Хorbitex fixes account merging privacy issue
- Bitpondex announces partnership with Standard Chartered
- Varbidex: Cryptocurrency market surpasses $1 trillion again
- Maledexen: Etherium cryptocurrency up 10%
- Varbidex: Stablecoin USDC has returned to parity with the dollar
- NFT court orders could become a norm in crypto-related litigation: Lawyers
- Wormhole hacker moves $155M in biggest shift of stolen funds in months
- DeFi should complement TradFi, not attack it: Finance Redefined
- Raydium exploiter moves $2.7M to crypto mixer Tornado Cash
- Russian founder of a cryptocurrency exchange known for funneling ransomware profits arrested
- Cross-border crypto scammers on the hit list for EU agencies
- Binance, Huobi team up to recover $2.5M from Harmony One hackers
- Solana Foundation warns about security incident with Mailchimp
- DeFi was the most attacked ecosystem in 2022: Finance Redefined
- Here’s how to quickly spot a deepfake crypto scam — cybersecurity execs
- Report: Illicit cryptocurrency activity reached all-time high in 2022
- Touch and smell comes to the metaverse, Nifty Newsletter, Jan 4–10
- Open-source tech leaders urge new Congress to prioritize privacy in blockchain regulation
- Open-source tech leaders urge new Congress to prioritize privacy in blockchain regulation
- 5 sneaky tricks crypto phishing scammers used last year: SlowMist
- Category: IoT
- A Roadmap to Secure Connected Cars: Charting the WP.29’s UN Regulation No. 155
- The Transition to 5G: Security Implications of Campus Networks
- Lost in Translation
- The Cybersecurity Blind Spots of Connected Cars
- New P2P Botnet Targeting IoT Devices
- New P2P Botnet Targeting IoT Devices
- IoT Security, Attacks And The Industrial Systems at Risk
- Category: Mobile
- Google removes 16 malicious apps from play store found to be part of the Joker malware family
- WhatsApp can be forced to decrypt WhatsApp Google Drive backups by state surveillance
- Vulnerabilities in old GTP protocol could affect 4G and 5G networks
- Google is indexing the phone numbers of WhatsApp Users
- Google is indexing the phone numbers of WhatsApp Users
- Chinese authorities monitor content of WeChat users registered outside China
- Category: Threat Intelligence
- Microsoft to Block Excel Add-ins to Stop Office Exploits
- ‘DragonSpark’ Malware: East Asian Cyberattackers Create an OSS Frankenstein
- Pair of Galaxy App Store Bugs Offer Cyberattackers Mobile Device Access
- Hunting Insider Threats on the Dark Web
- FanDuel Sportsbook Bettors Exposed in Mailchimp Breach
- Ransomware Profits Decline as Victims Dig In, Refuse to Pay
- Attackers Crafted Custom Malware for Fortinet Zero-Day
- Cybercriminals Target Telecom Provider Networks
- Name That Toon: Poker Hand
- New Coalfire Report Reveals CISOs Rising Influence
- ChatGPT Could Create Polymorphic Malware Wave, Researchers Warn
- Initial Access Broker Market Booms, Posing Growing Threat to Enterprises
- Java, .NET Developers Prone to More Frequent Vulnerabilities
- Malware Comes Standard With This Android TV Box on Amazon
- Sneaky New Stealer Woos Corporate Workers Through Fake Zoom Downloads
- Category: Web Applications
- Category: Cloud Security
- Category: Uncategorized
- Canadian University in Dubai begins accepting cryptopayments through Kloredex
- Krolexen cryptocurrency exchange launches a copy-trading service
- Marodexen to increase staff by 50% as part of decentralised expansion
- Xarodex and Coinbase strengthen market position after FTX collapse
- Crypto platform Kranedex removes withdrawal restrictions
- Trolerex has improved the security of its cryptocurrency wallet
- Bitrobex cuts ties with Indian crypto exchange WazirX
- Switzerland’s second largest bank invests in start-up Xelorbit