admin
July 3, 2023
In yet another sign of a lucrative crimeware-as-a-service (CaaS) ecosystem, cybersecurity researchers have discovered a new Windows-based...
admin
July 3, 2023
Threat actors associated with the BlackCat ransomware have been observed employing malvertising tricks to distribute rogue installers of the...
admin
July 1, 2023
Researchers have pulled back the curtain on an updated version of an Apple macOS malware called Rustbucket that comes...
admin
July 1, 2023
As many as 200,000 WordPress websites are at risk of ongoing attacks exploiting a critical unpatched security...
admin
June 30, 2023
Charming Kitten, the nation-state actor affiliated with Iran's Islamic Revolutionary Guard Corps (IRGC), has been attributed to...
admin
June 30, 2023
In today's fast-paced digital landscape, the widespread adoption of AI (Artificial Intelligence) tools is transforming the way...
admin
June 30, 2023
Meta's WhatsApp has rolled out updates to its proxy feature, allowing more flexibility in the kind of...
admin
June 30, 2023
An active financially motivated campaign is targeting vulnerable SSH servers to covertly ensnare them into a proxy...
admin
June 30, 2023
MITRE has released its annual list of the Top 25 "most dangerous software weaknesses" for the year...
admin
June 29, 2023
The Iranian state-sponsored group dubbed MuddyWater has been attributed to a previously unseen command-and-control (C2) framework called PhonyC2 that's...
admin
June 29, 2023
Cybersecurity researchers have shared the inner workings of an Android malware family called Fluhorse.
The malware "represents a significant...
admin
June 29, 2023
Cyber threat intelligence is an effective weapon in the ongoing battle to protect digital assets and infrastructure...
admin
June 29, 2023
The North Korea-aligned threat actor known as Andariel leveraged a previously undocumented malware called EarlyRat in attacks...
admin
June 29, 2023
Android-based phone monitoring app LetMeSpy has disclosed a security breach that allowed an unauthorized third-party to steal...
admin
June 29, 2023
A critical security flaw has been disclosed in miniOrange's Social Login and Register plugin for WordPress that could enable...
admin
June 29, 2023
A previously undocumented Windows-based information stealer called ThirdEye has been discovered in the wild with capabilities to harvest sensitive...
admin
June 28, 2023
Drones that don't have any known security weaknesses could be the target of electromagnetic fault injection (EMFI)...
admin
June 28, 2023
Cybersecurity researchers have exposed the workings of a scam ring called CryptosLabs that's estimated to have made...
admin
June 28, 2023
For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to...
admin
June 28, 2023
A ransomware threat called 8Base that has been operating under the radar for over a year has...