Your browser does not seem to support JavaScript. As a result, your viewing experience will be diminished, and you have been placed in read-only mode.
Please download a browser that supports JavaScript, or enable it if it's disabled (i.e. NoScript).
Following a brazen ransomware attack by the REvil cybergang, CISA and FBI offer guidance to victims.
https://threatpost.com/kaseya-attack-fallout/167541/
SEGA’s disclosure underscores a common, potentially catastrophic, flub — misconfigured Amazon Web Services (AWS) S3 buckets.
https://threatpost.com/sega-security-aws-s3-exposed-steam/177352/
The Microsoft Exchange ProxyShell vulnerabilities are being exploited yet again for ransomware, this time with Babuk from the new “Tortilla” threat actor.
https://threatpost.com/tortilla-exchange-servers-proxyshell/175967/
Cyberattackers are targeting security vulnerabilities in four plugins plus Epsilon themes, to assign themselves administrative accounts.
https://threatpost.com/active-attack-takeover-wordpress/176933/