Cencora Data Breached, Personal Information of Patients StolenÂ
The Cencora Data Breach resulted in theft of sensitive data after malicious actors gained unauthorized access to their corporate IT
The Cencora Data Breach resulted in theft of sensitive data after malicious actors gained unauthorized access to their corporate IT
A hacking group known as ‘UAC-0184’ using steganographic image files and IDAT loader Malware to distribute the Remcos RAT (remote
Security researchers have recently uncovered a new campaign aimed at Linux hosts, specifically targeting Redis servers. This campaign employs a
Recent versions of the Raspberry Robin malware have become more covert and employ one-day exploits that specifically target vulnerable systems.
Recent phishing attacks have exploited Microsoft Teams group chat requests to distribute malicious attachments containing DarkGate malware. The attackers exploited
The ‘Blackwood hackers’ have been engaging in cyberespionage attacks since 2018 and employs a highly sophisticated malware called NSPX30. Interestingly,
The Bigpanzi cybercrime gang has been generating substantial profits by infecting Android TV, Android TV boxes and various eCos set-top
The FBI and Cybersecurity and Infrastructure Security Agency (CISA) have issued a warning about the Androxgh0st malware botnet. They have
Cyber attacks today have become a daily occurrence in today’s hyperconnected world. With more users and devices getting online each
Security researchers have recently discovered a sophisticated hacking technique that enables cyber criminals to gain unauthorized entry into individuals’ Google
Subscribe to the Daily Security Review Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.