Discussions   Trending Threats

Brute-force Email Hacking Tool from OilRig ATP Group Leaked Online (1)
New “BlackSquid” Malware Utilizes Eight Notorious Exploits to Drop XMRig Miner (1)
Nearly 12M Quest Diagnostics Patients Affected by AMCA Data Breach (1)
Australian National University Data Breach Exposes 19 Years of Student Data (1)
Over 1.6M Personal Donor Records Exposed by UChicago Medicine (1)
Threat Actors Build “Frankenstein” Campaign Using Open-Source Tools (1)
New HAWKBALL Backdoor Targets Government Sector in Central Asia (1)
RIG Exploit Kit is Now Pushing the Buran Ransomware (1)
Tech Data Leaked 264GB in Client and Business Data (1)
Vulnerability Found in MTA Exim, Could Impact More Than 4.1M Email Systems (1)
Magecart Skimmers Found on Amazon CloudFront CDN (1)
Aggressive Brute Force Campaign “GoldBrute” Trying to Access 1.5M RDP Servers (1)
HiddenWasp Malware Stings Targeted Linux Systems (2)
DuckDuckGo Android Browser Vulnerable to URL Spoofing Attacks (2)
Drive-by download campaign targets Chinese websites, experiments with exploits (2)
Return of the City of Cron Malware Infections on Joomla and WordPress (1)
Nearly One Million Still Vulnerable to "Wormable" BlueKeep RDP Flaw (1)
Phishing Email Pretends to be Office 365 'File Deletion' Alerts (1)
New Rocke Variant Ready to Box Any Mining Challengers (1)
Contain Yourself, Docker: Race-condition Bug Puts Host Machines at Risk... Sometimes, Ish (1)
Emissary Panda Attacks Middle East Government Sharepoint Servers (1)
The Nansh0u Campaign - Hackers Arsenal Grows Stronger (1)
Crypto Scam Alert: Youtube Videos Promoting "Bitcoin Generator" Really Pushing Malware (1)
Checkers Restaurant Chain Discloses Card Breach (1)
Infected Cryptocurrency-mining Containers Target Docker Hosts With Exposed APIs, Use Shodan to Find Additional Victims (1)
Improper App Check Revives the Synthetic Clicks Issue in macOS Mojave (1)
Recent MuddyWater-Associated BlackWater Campaign Shows Signs of New Anti-Detection Techniques (1)
Trickbot Watch: Arrival via Redirection URL in Spam (1)
Hawkeye Keylogger via Fake Receipt. Stolen Data Sent to Another Keylogger Site (1)
Skimmer Acts as Payment Service Provider via Rogue Iframe (1)