Slack user credentials leaked; reset your password immediately
A couple of years after the data breach that forced a massive password reset, operators of the Slack email service have asked their users on Android devices to reset theirRead More →
A couple of years after the data breach that forced a massive password reset, operators of the Slack email service have asked their users on Android devices to reset theirRead More →
Nowadays millions of users concerned about their privacy when browsing the Internet resort to using tools to hide their activity as much as possible, using methods like the web browserRead More →
The gamer community is facing new risk through the communication platform Discord. Reports indicate that a cybercriminal group is abusing this platform to deploy malware against thousands of users. ExpertsRead More →
As a result of an international police operation organized by Europol, 8 individuals accused of deploying multiple SIM swap attacks against celebrities in the United States were arrested. This criminalRead More →
CD Projekt Red, a videogame developing company, revealed this morning that it was the victim of a ransomware attack that compromised its IT systems and would have resulted in theRead More →
Ukrainian authorities announced the arrest of an individual identified as the main responsible for the development and maintenance of a set of tools for the deployment of sophisticated phishing campaignsRead More →
A severe configuration error in Emsisoft‘s cybersecurity company systems has resulted in a breach of sensitive data. Christian Mairoll, co-founder and manager of the company, confirmed the information leaking onRead More →
The operators of the Ziggy ransomware variant have announced the shutdown of their infrastructure and the publication of decryption keys for all versions of the malware, meaning that victims ofRead More →
Approximately 10 million smart devices with Android system would have been exposed to cyberattacks after the Barcode Scanner app, a popular barcode scanning tool, received a malicious update that renderedRead More →
In most cyberattack variants threat actors use legitimate-looking documents loaded with malware, which is why researchers often say it all starts with a Word file, Power Point presentation, Excel spreadsheet,Read More →