Jun 07, 2024The Hacker NewsSoftware Supply Chain / Myrror Security Traditional SCAs Are Broken: Did You Know You Are Missing Critical Pieces? ...
Category: Attack
Jun 07, 2024NewsroomRansomware / Endpoint Security The U.S. Federal Bureau of Investigation (FBI) has disclosed that it's in possession of mor...
Jun 07, 2024NewsroomCyber Attack / Malware The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of cyber attacks targeting def...
Jun 07, 2024NewsroomCryptojacking / Vulnerability The threat actor known as Commando Cat has been linked to an ongoing cryptojacking attack ca...
Jun 06, 2024NewsroomBotnet / DDoS Attack The distributed denial-of-service (DDoS) botnet known as Muhstik has been observed leveraging a now-p...
Learn about critical threats that can impact your organization and the bad actors behind them from Cybersixgill's threat experts. Each story shi...
Jun 06, 2024NewsroomEndpoint Security / Malware Threat actors are increasingly abusing legitimate and commercially available packer software s...
Jun 06, 2024The Hacker NewsPassword Security / Dark Web Tom works for a reputable financial institution. He has a long, complex password that ...
Jun 06, 2024NewsroomData Encryption / Privacy Google has announced plans to store Maps Timeline data locally on users' devices instead of thei...
Jun 06, 2024NewsroomSoftware Security / Data Theft Cybersecurity researchers have discovered a malicious Python package uploaded to the Python...