Latest News
New Codefinger Ransomware Exploits AWS to Encrypt S3 Buckets
The Halcyon RISE Team has identified a new Codefinger ransomware campaign targeting Amazon S3 buckets. This attack leverages…
January 14, 2025
AI, Web3 and Decentralization: Tech Trends Shaping 2025’s Altcoin Season
Prepare for the 2025 altcoin season: experts predict rising interest in altcoins like WorldCoin, driven by Web3, blockchain,…
January 14, 2025
Malicious Kong Ingress Controller Image Found on DockerHub
A critical security breach in the software supply chain has been detected. An attacker accessed Kong’s DockerHub account…
January 14, 2025
3 Russians Indicted for Operating Blender.io and Sinbad.io Crypto Mixers
SUMMARY Three Russian nationals have been indicted for their alleged roles in running cryptocurrency mixing services Blender.io and…
January 13, 2025
Hackers Breach Telefonica Network, Leak 2.3 GB of Data Online
Telefónica faces a data breach impacting its internal systems, linked to hackers using compromised credentials. Learn more about this alarming cyber threat.
January 13, 2025
The Metaverse Will Become More Popular Than the Real World: Will Reality Disappear?
With the advent of virtual reality, everyone got scared that the life we know will disappear, and only…
January 12, 2025
Fake CrowdStrike Recruiters Distribute Malware Via Phishing Emails
SUMMARY Cybercriminals are deploying a tricky new phishing campaign impersonating the cybersecurity firm CrowdStrike‘s recruiters to distribute a…
January 11, 2025
Fake PoC Exploit Targets Cybersecurity Researchers with Malware
A fake proof-of-concept (PoC) exploit designed to lure cybersecurity researchers into downloading malicious software. This deceptive tactic leverages a recently patched critical vulnerability in Microsoft's Windows LDAP service (CVE-2024-49113), which can cause denial-of-service attacks.
January 11, 2025
Muddling Meerkat Linked to Domain Spoofing in Global Spam Scams
Infoblox cybersecurity researchers investigating the mysterious activities of 'Muddling Meerkat' unexpectedly uncovered widespread use of domain spoofing in malicious spam campaigns.
January 11, 2025
Ivanti Urges Patch for Flaws in Connect Secure, Policy Secure and ZTA Gateways
Ivanti has issued a critical security advisory addressing two vulnerabilities in its Connect Secure, Policy Secure, and ZTA Gateway products.
January 10, 2025