admin
March 31, 2025
Entities in Ukraine have been targeted as part of a phishing campaign designed to distribute a remote...
admin
March 30, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has shed light on a new malware called RESURGE...
New Android Trojan Crocodilus Abuses Accessibility to Steal Banking and Crypto Credentials

3 min read
admin
March 29, 2025
Cybersecurity researchers have discovered a new Android banking malware called Crocodilus that's primarily designed to target users...
admin
March 29, 2025
In what's an instance of hacking the hackers, threat hunters have managed to infiltrate the online infrastructure...
admin
March 28, 2025
Cybersecurity researchers are calling attention to a new sophisticated malware called CoffeeLoader that's designed to download and...
admin
March 28, 2025
Cybersecurity researchers have disclosed 46 new security flaws in products from three solar inverter vendors, Sungrow, Growatt,...
admin
March 28, 2025
Mozilla has released updates to address a critical security flaw impacting its Firefox browser for Windows, merely...
admin
March 28, 2025
Long gone are the days when a simple backup in a data center was enough to keep...
admin
March 28, 2025
An Android malware family previously observed targeting Indian military personnel has been linked to a new campaign...
admin
March 28, 2025
Cybersecurity researchers have discovered several cryptocurrency packages on the npm registry that have been hijacked to siphon...
admin
March 27, 2025
Cybersecurity researchers have shed light on a new phishing-as-a-service (PhaaS) platform that leverages the Domain Name System...
admin
March 27, 2025
A new analysis has uncovered connections between affiliates of RansomHub and other ransomware groups like Medusa, BianLian,...
admin
March 27, 2025
An advanced persistent threat (APT) group with ties to Pakistan has been attributed to the creation of...
admin
March 27, 2025
Whether it’s CRMs, project management tools, payment processors, or lead management tools - your workforce is using...
admin
March 27, 2025
Hackers have long used Word and Excel documents as delivery vehicles for malware, and in 2025, these...
admin
March 27, 2025
An ongoing campaign that infiltrates legitimate websites with malicious JavaScript injects to promote Chinese-language gambling platforms has...
admin
March 27, 2025
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added two six-year-old security flaws impacting Sitecore CMS...
admin
March 27, 2025
A critical security flaw has been disclosed in NetApp SnapCenter that, if successfully exploited, could allow privilege...
admin
March 26, 2025
Cybersecurity researchers have discovered two malicious packages on the npm registry that are designed to infect another...
admin
March 26, 2025
“A boxer derives the greatest advantage from his sparring partner…”
— Epictetus, 50–135 AD
Hands up. Chin...