Threat intelligence. Understanding the basic concepts of cyber intelligence
Explosive Growth of the Threat Intelligence Market Threat Intelligence (TI) is a…
Snappy Tool Helps You Detect Rogue Wi-Fi Hotspots
How to Spot Fake Wi-Fi Access Points with Trustwave's Snappy Tool Security…
Over 330,000 Fortinet devices vulnerable to critical RCE bug
Hundreds of Thousands of FortiGate Firewalls Still Vulnerable to CVE-2023-27997 Hundreds of…
BlackCat ransomware operators distribute malware disguised as WinSCP
BlackCat Ransomware Group Imitates WinSCP for Windows App Site to Distribute Malware…
Updated RustBucket malware targets macOS
RustBucket Malware: North Korean Hackers Target macOS Users Elastic Security Labs specialists…
Online cinemas and TV channels against the use of foreign content without permission
Online Cinemas and TV Channels Oppose State Duma's Proposal to Use Foreign…
Chinese hackers use HTML smuggling to attack European diplomats
SmugX Malware Campaign Linked to Chinese Hack Groups Discovered by Check Point…
Mexican man stole over 350,000 euros from bank accounts using SMS phishing
Neo_Net: The Hispanic Hacker Behind a Series of Financial Institution Attacks SentinelOne…
Akira ransomware now has a free decryptor
Avast Releases Free Decryptor for Akira Ransomware Victims Avast has released a…
In Russia, they checked the stability of the Runet in case of a shutdown from the outside
Russia Conducts Exercise to Ensure Sustainable and Safe Functioning of the Internet…