admin
January 20, 2025
The Threat actor known as DoNot Team has been linked to a new Android malware as part...
admin
January 20, 2025
Cybersecurity researchers have identified three sets of malicious packages across the npm and Python Package Index (PyPI)...
admin
January 19, 2025
Popular video-sharing social network TikTok has officially gone dark in the United States, 2025, as a federal...
admin
January 18, 2025
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) has imposed sanctions against a Chinese cybersecurity...
admin
January 17, 2025
Cybersecurity researchers have disclosed three security flaws in Planet Technology's WGS-804HPT industrial switches that could be chained...
admin
January 17, 2025
Cybersecurity researchers have exposed a new campaign that targets web servers running PHP-based applications to promote gambling...
admin
January 17, 2025
Recent data breaches have highlighted the critical need to improve guest Wi-Fi infrastructure security in modern business...
admin
January 17, 2025
The U.S. Treasury Department's Office of Foreign Assets Control (OFAC) sanctioned two individuals and four entities for...
admin
January 17, 2025
Cybersecurity researchers have detailed a new adversary-in-the-middle (AitM) phishing kit that's capable of Microsoft 365 accounts with...
admin
January 17, 2025
Austrian privacy non-profit None of Your Business (noyb) has filed complaints accusing companies like TikTok, AliExpress, SHEIN,...
Russian Star Blizzard Shifts Tactics to Exploit WhatsApp QR Codes for Credential Harvesting

3 min read
admin
January 16, 2025
The Russian threat actor known as Star Blizzard has been linked to a new spear-phishing campaign that...
admin
January 16, 2025
You can tell the story of the current state of stolen credential-based attacks in three numbers:
Stolen credentials...
admin
January 16, 2025
Details have emerged about a now-patched security vulnerability that could allow a bypass of the Secure Boot...
admin
January 16, 2025
Cybersecurity researchers have found that the Microsoft Active Directory Group Policy that's designed to disable NT LAN...
admin
January 16, 2025
Threat actors have been observed concealing malicious code in images to deliver malware such as VIP Keylogger...
admin
January 16, 2025
The digital world is exploding. IoT devices are multiplying like rabbits, certificates are piling up faster than...
admin
January 16, 2025
Cybersecurity researchers have detailed an attack that involved a threat actor utilizing a Python-based backdoor to maintain...
admin
January 16, 2025
Ivanti has rolled out security updates to address several security flaws impacting Avalanche, Application Control Engine, and...
admin
January 15, 2025
Why does ICS/OT need specific controls and its own cybersecurity budget today? Because treating ICS/OT security with...
admin
January 15, 2025
Cybersecurity researchers have alerted to a new malvertising campaign that's targeting individuals and businesses advertising via Google...