Zephyrnet Logo

Tag: hackers

State-sponsored hackers are now using coronavirus lures to infect their targets

Government-backed hacking groups from China, North Korea, and Russia are not letting a global pandemic go to waste and have begun using...

Hackers using fake live Coronavirus map to spread malware

Hackers are spreading misinformation including fake live maps of areas hit by Coronavirus disaster to spread Azorult malware. There is probably no...

Partner Best Practices for Remote Incident Response and Assessment Service Delivery

In the past, Incident Responders and Security Analysts had to fly out to a network to help contain and investigate an incident...

Card data stole from the Volusion security breach surfaces on the dark web

Security experts have discovered that card data stolen last year from Volusion-hosted online stores is now available for sale on the dark web....

Malicious Actors and Medical Data: Where Are We Heading?

Data is the hottest commodity in town, particularly on the dark web. But there’s one type of file that hackers are...

Card data from the Volusion web skimmer incident surfaces on the dark web

Card data stolen last year from Volusion-hosted online stores has surfaced on the dark web, Gemini Advisory, a threat intel firm specialized in...

UK And Netherlands Most At Risk In Europe When Mitigating Critical Vulnerabilities

New vulnerability research by Outpost24 has revealed interesting data trends in vulnerability management across different regions and sectors. When analysed, the number of...

Don’t download this Coronavirus map

I’ve already reported on the dangers online, as hackers hide behind our coronavirus obsession to target us with malicious malware. Well, here’s another...

MedusaLocker Leaves No Network Drive Safe

As it stands, ransomware is the cybersecurity problem that refuses to disappear. What started as malware specifically targeting home users is now...

Phishing Attacks Work Because… Humans

If the definition of insanity is repeating the same mistakes and expecting different results, then the definition of phishing is preying on human...

How Cryptographic Keys Development Will Drive Digital Asset Adoption

As the price of Bitcoin (BTC) crept up in recent months, it appears public interest in digital assets is once again on the...

RCE in popular ThemeREX WordPress Plugin has been actively exploited

The WordPress plugin ‘ThemeREX Addons’ is affected by a critical vulnerability that could allow remote attackers to execute arbitrary code. A critical...

Latest Intelligence

spot_img
spot_img