Cyber Security
There have been several reports recently about cybercriminals using AI-powered tools for malicious purposes which can give a paradise of information for nefarious purposes....
Hi, what are you looking for?
There have been several reports recently about cybercriminals using AI-powered tools for malicious purposes which can give a paradise of information for nefarious purposes....
Hackers actively target vulnerable WordPress websites in an effort to take advantage of a widespread WooCommerce Payments plugin vulnerability and gain admin rights. The...
A self-signed China-originated Rootkit acts as a universal downloader targeting gaming sectors to exfiltrate sensitive information. The threat actors abuse Microsoft signing portals to...
The ransomware attacks are becoming more frequent and rapidly increasing in size as well. This alarming pace of ransomware is significantly concerning the thousands...
Microsoft has taken another step towards security which has revolutionized the way security professionals use Microsoft 365 Defender across devices as well as cloud...
Security researchers have dissected a recently emerged ransomware strain named ‘Big Head’ that may be spreading through malvertising that promotes fake Windows updates and Microsoft Word...
Security researchers observed a new campaign they attribute to the Charming Kitten APT group where hackers used new NokNok malware that targets macOS systems. The...
The DPRK campaign is utilizing a recently updated version of Rustbucket malware to avoid being detected. This variant of RUSTBUCKET, targets macOS systems, adds...
Since November 2020, a covert campaign utilizing the ‘Horabot’ botnet malware has specifically targeted Spanish-speaking users across Latin America, infecting them with a banking...
The rapid expansion of the internet has provided an ideal environment for malware to thrive. As more people and organizations connect to the internet,...
Recent Comments