Ransomware hackers dwell time drops to 5 days, RDP still widely used August 24, 2023 Ransomware threat actors are spending less time on compromised networks before security solutions sound the alarm. In the first half of
New Whiffy Recon malware uses WiFi to triangulate your location August 24, 2023 Cybercriminals behind the Smoke Loader botnet are using a new piece of malware called Whiffy Recon to triangulate the location
New Windows updates cause UNSUPPORTED_PROCESSOR blue screens August 24, 2023 Microsoft says the August 2023 preview updates released this week for Windows 11 and Windows 10 systems are causing blue
Jupiter X Core WordPress plugin could let hackers hijack sites August 24, 2023 Two vulnerabilities affecting some version of Jupiter X Core, a premium plugin for setting up WordPress and WooCommerce websites, allow
Hackers use public ManageEngine exploit to breach internet org August 24, 2023 The North Korean state-backed hacker group tracked as Lazarus has been exploiting a critical vulnerability (CVE-2022-47966) in Zoho’s ManageEngine ServiceDesk
Lapsus$ teen hackers convicted of high-profile cyberattacks August 24, 2023 A London jury has found that an 18-year-old member of the Lapsus$ data extortion gang helped hack multiple high-profile companies, stole