FBI, CISA warns Of ALPHV Blackcat Ransomware Attacking Hospitals
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human...
The Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human...
Threat actors hijack routers to gain unauthorized access to network traffic. This enables them to monitor, manipulate, or intercept sensitive...
A new threat activity has been discovered that relates to the Iran-Nexus espionage activity that targets Aerospace, Aviation, and defense...
A critical vulnerability has been discovered in the LiteSpeed Cache plugin, a popular WordPress plugin installed on over 4 million...
Recently, the cybersecurity researchers at ANY.RUN identified that hackers are selling DCRat subscriptions for $5 on the Telegram groups. Hackers...
The Ann & Robert H. Lurie Children’s Hospital of Chicago was recently hit by a highly advanced ransomware attack, underlining...
Threat actors use weaponized PDF files to exploit software vulnerabilities, enabling them to execute malicious code on a target system. ...
The newly updated Cybersecurity Framework (CSF 2.0) offers simplified cybersecurity guidance designed for everyone, from small nonprofits to large corporations....
In a seemingly impossible act, nearly 8000 domains were discovered to be compromised by threat actors for malicious scam campaigns...
Steganography is employed by threat actors to hide malicious payloads in benign files such as pictures or documents. By using...
[mc4wp_form id=”387″]
[mc4wp_form id=”387″]
Copyright © 2022 Cyber Affairs. All rights reserved.