The Medusa ransomware group is operating at a fast pace by leveraging zero-days and quickly exploiting new bugs and breached ...
Microsoft says that Storm-1175, a China-based financially motivated cybercriminal group known for deploying Medusa ransomware ...
Forbes contributors publish independent expert analyses and insights. Davey Winder is a veteran cybersecurity writer, hacker and analyst. Admit it: the first thing you think of when ransomware is ...
Threat actors armed with Medusa ransomware are actively exploiting a maximum-severity security vulnerability in Fortra's GoAnywhere managed file transfer (MFT) product, sparking more questions about ...
When we talk to people whose computers have been infected, they often ask how it happened. In a growing number of cases, they have been doing nothing more than reading a news website or browsing for ...
The Coruna iOS exploit kit is likely an updated version of the exploitation framework used in Operation Triangulation.
Infosec in Brief The former General Manager of defense contractor L3Harris’s cyber subsidiary Trenchant sold eight zero-day exploit kits to Russia, according to a court filing last week.… We first ...
Multiple ransomware groups have been weaponizing an authentication bypass bug in VMware ESXi hypervisors to quickly deploy malware across virtualized environments. VMware assigned the bug ...
90% of ransomware incidents exploit firewalls – and the fastest observed ransomware case took three hours from breach to encryption. Most widely detected CVE vulnerability dates from 2013 – 11% of ...
Hackers Used New Exploit Kit to Compromise Thousands of iPhones Your email has been sent An iOS exploit framework has revealed how advanced mobile attack tools can move rapidly from surveillance ...
A leaked exploit kit capable of hacking iPhones is now public, potentially putting millions of devices at risk—especially ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results