admin
January 4, 2024
The threat actor known as UAC-0050 is leveraging phishing attacks to distribute Remcos RAT using new strategies...
admin
January 4, 2024
American cybersecurity firm and Google Cloud subsidiary Mandiant had its X (formerly Twitter) account compromised for more...
admin
January 3, 2024
Information stealing malware are actively taking advantage of an undocumented Google OAuth endpoint named MultiLogin to hijack...
admin
January 3, 2024
As technology adoption has shifted to be employee-led, just in time, and from any location or device,...
admin
January 3, 2024
A new exploitation technique called Simple Mail Transfer Protocol (SMTP) smuggling can be weaponized by threat actors...
admin
January 3, 2024
The U.S. Department of Justice (DoJ) on Tuesday said it reached a settlement with VoIP service provider...
admin
January 2, 2024
Security stakeholders have come to realize that the prominent role the browser has in the modern corporate...
admin
January 2, 2024
Google has agreed to settle a lawsuit filed in June 2020 that alleged that the company misled users by...
admin
January 1, 2024
Security researchers have detailed a new variant of a dynamic link library (DLL) search order hijacking technique...
admin
January 1, 2024
Security researchers from Ruhr University Bochum have discovered a vulnerability in the Secure Shell (SSH) cryptographic network...
admin
January 1, 2024
A new Go-based malware loader called JinxLoader is being used by threat actors to deliver next-stage payloads such as Formbook...
admin
December 30, 2023
Cybersecurity researchers are warning about an increase in phishing attacks that are capable of draining cryptocurrency wallets.
"These...
admin
December 29, 2023
The Assembly of the Republic of Albania and telecom company One Albania have been targeted by cyber...
admin
December 29, 2023
Microsoft on Thursday said it’s once again disabling the ms-appinstaller protocol handler by default following its abuse by multiple...
admin
December 29, 2023
The Computer Emergency Response Team of Ukraine (CERT-UA) has warned of a new phishing campaign orchestrated by...
admin
December 29, 2023
Nation-state actors affiliated to North Korea have been observed using spear-phishing attacks to deliver an assortment of...
admin
December 28, 2023
Google Cloud has addressed a medium-severity security flaw in its platform that could be abused by an...
admin
December 28, 2023
A new malware loader is being used by threat actors to deliver a wide range of information stealers such...
admin
December 28, 2023
The Operation Triangulation spyware attacks targeting Apple iOS devices leveraged never-before-seen exploits that made it possible to even bypass...
admin
December 27, 2023
A new zero-day security flaw has been discovered in the Apache OfBiz, an open-source Enterprise Resource Planning...