Data Breach

Home/Data Breach
8 08, 2023

Suspected Vietnamese hacker targets Chinese, Bulgarian organizations with new ransomware

By | 2023-08-10T07:22:44+05:30 August 8th, 2023|Compromised, cyberattack, Darknet, Data Breach, Evilproxy, Exploitation, Internet Security, IOC's, malicious cyber actors, Ransomware, Security Advisory, Security Update|

Since June 4, 2023, an unidentified threat actor has been employing a Yashma ransomware variant [...]

8 08, 2023

QakBot Malware Operators Ramp Up C2 Network with 15 New Servers

By | 2023-08-14T06:54:31+05:30 August 8th, 2023|Backdoor, BOTNET, Compromised, cyberattack, Data Breach, Evilproxy, Exploitation, infostealer, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update, Software Issues, Targeted Attacks, Tips|

As of late June 2023, the QakBot (aka QBot) malware operators have established 15 new [...]

8 08, 2023

“Critical Remote Code Execution (RCE) Vulnerability (CVE-2023-39143) in PaperCut Application Servers”

By | 2023-08-10T07:24:57+05:30 August 8th, 2023|BOTNET, Compromised, cyberattack, Darknet, Data Breach, Evilproxy, Exploitation, infostealer, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update, Tips, vulnerability|

PaperCut NG and PaperCut MF are widely adopted software solutions for managing print services on [...]

7 08, 2023

Fake VMware vConnector package detected in PyPI

By | 2023-08-14T06:54:51+05:30 August 7th, 2023|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

IT professionals were targeted by a malicious package named "VMConnect," which impersonated the VMware vSphere [...]

4 08, 2023

Malicious apps employ sneaky versioning techniques to evade detection by Google Play Store scanners.

By | 2023-08-14T07:00:36+05:30 August 4th, 2023|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update|

Threat actors use versioning to bypass Google Play Store's malware detection and target Android users. [...]

Subscribe to our newsletter to receive security tips everday!