December 6, 2023
Uncovering a New Bluetooth Vulnerability: Threats to iOS, Linux, macOS, and Android Devices
In the realm of cybersecurity, a significant concern has emerged as threat…
December 5, 2023
iPhone Users Beware: Sneaky Attack Utilizing a Fake Lockdown Mode
Security experts have recently uncovered a sophisticated…
December 4, 2023
BLUFFS Bluetooth Attack is Putting Devices at Risk
Recent investigations have brought to light a series of sophisticated attacks…
November 30, 2023
Google’s New Defense Against Spam and Malicious Emails
With the intention of assisting in the identification of potentially hazardous…
November 30, 2023
North Korea’s Lazarus Group has made $3 billion out of cryptocurrency hacks.
Since at least 2017, threat actors from the Democratic People’s Republic…
November 28, 2023
The Methods Cybercriminals Use to Get Your Users’ Passwords and Then Sell Them
The value of account credentials has increased in the cybercrime market since…
November 27, 2023
Uncovering a Passive Approach to Extracting Private RSA Keys from SSH Tunnels
A recent study has shed light on the potential for passive network attackers to…
November 23, 2023
Emails with a shipping theme are being used to spread a new WailingCrab malware loader.
Cybercriminals are employing email messages centred around delivery and…
November 22, 2023
North Korean hackers pose as recruiters and job seekers.
Threat actors from North Korea have been linked to two campaigns. In these…
November 21, 2023
NetSupport RAT targets both the business and government sectors
A remote access trojan, known as NetSupport RAT, is actively being used by…
November 20, 2023
Play Ransomware Is being Provided as a Service to Cybercriminals
The Play ransomware strain has transformed into a lucrative business model,…
November 16, 2023
CISA Issue a Public Alert Regarding Rhysida Ransomware
The threat actors behind the Rhysida ransomware conduct opportunistic attacks…
November 15, 2023
Unveiling a New Ransomware Group: Leveraging Hive’s Source Code and Infrastructure
To propel their initiatives in the threat landscape, the threat actors…
November 14, 2023
A DDoS botnet OracleIV is targeting public Docker Engine APIs
Publicly accessible instances of the Docker Engine API are currently under…
November 13, 2023
A new Intel CPU vulnerability affects multi-tenant virtualized environments
Intel has swiftly responded to the critical Reptar vulnerability, extending its…
November 9, 2023
CISA has issued a warning that a high-severity SLP vulnerability is now being actively exploited.
On Wednesday, the United States Cybersecurity and Infrastructure Security…
November 8, 2023
Deceptive Tactics through a Fake Windows News Portal
Recent findings reveal a novel malvertising strategy employing counterfeit…
November 7, 2023
A new type of GootLoader malware is hard to catch and spreads quickly.
Researchers have discovered that non-privileged attackers are exploiting as…
November 6, 2023
Google’s Security Measures Fall Short Against SecuriDropper
Cybersecurity experts have discovered a new Android Dropper-as-a-Service (DaaS)…
November 2, 2023
Researchers Uncover Vulnerabilities in 34 Windows Drivers
Researchers have discovered that non-privileged attackers are exploiting as…
November 1, 2023
F5 warns of active attacks that take advantage of a BIG-IP vulnerability
F5 is alerting the public about an active misuse of a critical security…
October 31, 2023
Infected NuGet Packages Unearthed Distributing the SeroXen Remote Administration Tool
Within the realm of information security, diligent researchers have unveiled a…
October 30, 2023
Hackers Infecting Windows PCs with GHOSTPULSE via MSIX App Packages
A recently unveiled cyber assault campaign has uncovered a new threat in the…
October 26, 2023
VMware Releases Critical Patch for Remote Code Execution Vulnerability in vCenter Server
VMware has taken swift action to address a critical vulnerability in the…
October 26, 2023
Critical Flaws Discovered in OAuth Platforms: Grammarly, Vidio, and Bukalapak
The Open Authorization (OAuth) implementation in well-known web services, such…
October 25, 2023
Cisco’s Discovery: A Second Zero-Day Vulnerability Despite the Decline in Hacked Devices
Cisco, a cybersecurity industry leader, recently brought a troubling revelation…
October 19, 2023
Real-Time Code-Level Scanning is Now Available for Android Malware Thanks to Google Play Protect
An update to Google’s Play Protect has been released, and the company has…
October 18, 2023
Lazarus Group Is Going After Defense Experts Using Bogus Interviews Conducted Through Trojanized VNC Apps.
As part of a long-running campaign known as Operation Dream Job, the Lazarus…
October 17, 2023
Be Cautious of SpyNote, an Android Trojan That Records Both Audio and Phone Calls
The Android banking trojan known as SpyNote has been deconstructed, revealing…
October 16, 2023
Pro-Russian Hackers Exploiting New WinRAR Vulnerability in Phishing Campaign
In a targeted phishing campaign designed to extract sensitive credentials from…
October 12, 2023
Cisco Issues Urgent Patch to Address Critical Flaw in Emergency Responder Systems
Cisco has swiftly taken action to mitigate a significant security vulnerability…
October 12, 2023
BMC Firmware in Supermicro Reveals Multiple Critical Vulnerabilities
Recently, it was uncovered that Supermicro’s BMC firmware harbours…