A new security shortcoming discovered in Apple M-series chips could be exploited to extract secret keys used during cryptographic operations. Dubbed GoFetch,...
The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack to disarm...
Ransomware groups are increasingly switching to remote encryption in their attacks, marking a new escalation in tactics adopted by financially motivated actors...
Following a buyer on a hackers’ forum offering stolen data for US$100,000 (S$134,898) in bitcoin on Saturday, it is believed that gaming...
WhatsApp, owned by Meta, has threatened to quit the United Kingdom in the event that the government adopts the Online Safety Bill,...
Researchers from Checkpoint found a new and previously unknown ransomware variant dubbed “Rorschach” with highly sophisticated features that target U.S. companies. Rorschach...
The first-ever Linux variant of the Clop ransomware has been detected in the wild, but with a faulty encryption algorithm that has...
The Vice Society ransomware actors have switched to yet another custom ransomware payload in their recent attacks aimed at a variety of...
The message encryption system employed by Microsoft in Office 365 has a system vulnerabilities, according to a warning from the Finnish cybersecurity...
New research has disclosed what’s being called a security vulnerability in Microsoft 365 that could be exploited to infer message contents due...
The operators of the Hive ransomware-as-a-service (RaaS) scheme have overhauled their file-encrypting software to fully migrate to Rust and adopt a more...
Two bugs in the web interface of a Fujitsu cloud storage system would allow authenticated threat actors to read, write, and even...
A cyber-attack is a malicious attack undertaken by cybercriminals against single or numerous computers, computer systems, networks, or infrastructures utilizing one or...
A researcher has detected a critical vulnerability in some of the most common malware and ransomware variants today and whose exploitation would...
Cybersecurity specialists report the detection of a critical vulnerability in homomorphic encryption, one of the most advanced security technologies today. According to...
A bug in the Hive ransomware encryption algorithm would allow victims to recover their information without having to negotiate with hackers. This...
Recently, an Indian IT company that is specialized in the Banking and Financial Services sector, Nucleus Software has suffered a security breach...
Bitdefender’s cybersecurity specialists have released a free tool to remove the encryption provoked by the DarkSide ransomware, allowing victims to recover their...
The videoconferencing platform is making the feature available to users of both free and paid tiers
Here’s how encryption can help keep your data safe from prying eyes – even if your device is stolen or your cloud...
Cybersecurity researchers today discovered a new high-risk hardware vulnerability named kr00k or Kr00k Attack that is present in widely used Wi-Fi chips...