News
Two threats are back. According to a warning from the US authorities, Interlock ransomware is a new addition. An overview of ...
The Lumma Stealer is back after Microsoft and law enforcement took action to significantly disrupt the malware’s ...
The Lumma infostealer malware operation is gradually resuming activities following a massive law enforcement operation in May ...
A Superintendent of Immigration, simply identified as Suleiman, has been killed by terrorists suspected to be ISWAP elements at a service outpost in Lumma Sanke, Borgu LGA of Niger State.
Malicious GitHub repositories used by threat actors to host Amadey payloads and steal data, impacting targeted entities.
A new attack uses CVE-2021-41773 in Apache HTTP Server to install a cryptocurrency miner via compromised websites.
The cybersecurity industry often defines risk in terms of vulnerabilities, threat actors and tool coverage, but burnout may ...
A new malware campaign is using GitHub to quietly distribute an infostealer tool under the pretense of free utility software, ...
That’s exactly what one campaign, identified by cybersecurity firm Cyfirma, did. The malware was hosted openly on a GitHub ...
Criminals are using a dangerous fake free VPN to spread malware via GitHub - here's how to stay safe
Security experts have warned of an emerging new cyber threat involving fake VPN software hosted on GitHub. A report from Cyfirma outlines how malware disguises itself as a “Free VPN for PC” and lures ...
First, governments will receive real-time access to AI-powered threat intelligence, focused especially on detecting ...
A stolen copy of Shellter Elite shows how easily legitimate security tools can be repurposed by threat actors when vetting and oversight fail.
Some results have been hidden because they may be inaccessible to you
Show inaccessible results