Cybersecurity experts report the detection of a new variant of attack based on the manipulation of executable images. Identified as Process Ghosting, this attack would allow threat actors to bypass
Schneider Electric security teams reported the discovery of a set of critical vulnerabilities in its PowerLogic EGX100 and PowerLogic EGX3000 communication solutions, which are part of the company’s family of
Cybersecurity experts report that what seems to be the complete source code for the Paradise ransomware was posted on a hacking forum, allowing any group of threat actors to develop
During the past week it was confirmed that Electronic Arts (EA) computer systems were compromised, an incident that led to the leak of confidential information. While customer data was not
Chinese authorities made more than a thousand arrests thanks to the deployment of an intelligence operation against bank and electronic fraud. The “Operation Broken Card”, deployed by the Ministry of
This week, Interpol released a report on the results of Operation Pangea, which led to the shutdown of a never seen before number of fraudulent websites posing as pharmaceutical companies.
A few weeks ago, the major meat production company JBS suffered a ransomware attack that severely disrupted its operations, even causing excessive increases in the prices of its products. Over
The U.S. Department of Justice (DOJ) reported that Australian citizen Michael Pearse has pleaded guilty to one count of conspiracy to commit wire fraud, actively participating in an “auto sub”