A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software to deliver a previously unknown...
We all know passwords and firewalls are important, but what about the invisible threats lurking beneath the surface of your systems? Identity...
Pirated applications targeting Apple macOS users have been observed containing a backdoor capable of granting attackers remote control to infected machines. “These...
Tactical and targeting overlaps have been discovered between the enigmatic advanced persistent threat (APT) called Sandman and a China-based threat cluster that’s...
Spyware masquerading as modified versions of Telegram have been spotted in the Google Play Store that’s designed to harvest sensitive information from...
Public Wi-Fi, which has long since become the norm, poses threats to not only individual users but also businesses. With the rise...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security flaw in Adobe ColdFusion to its Known Exploited Vulnerabilities...
The just-released BlackBerry Global Threat Intelligence Report reveals a 40% increase in cyberattacks against government and public service organizations versus the previous...
A new ransomware group known as ‘Rhysida’ has been operating since May 2023, posing a huge danger to the healthcare industry. Rhysida ransomware...
The use of illegal software has been under circulation ever since there have been torrents and cracked software. Recent reports show that...
Over the course of the weekend, numerous locations within the Cinépolis Chile network were victims of a cyberattack that was triggered by...
2022 was the year when inflation hit world economies, except in one corner of the global marketplace – stolen data. Ransomware payments...
A recently discovered cyber espionage group dubbed Worok has been found hiding malware in seemingly innocuous image files, corroborating a crucial link...
Do you find reports of spy cams found in vacation rentals unsettling? Try these tips for spotting hidden cameras to put your...
A Linux variant of the SideWalk backdoor has been developed by Chinese hackers who the Chinese government supports. Microsoft Windows OS-based systems...
A threat cluster with ties to a hacking group called Tropic Trooper has been spotted using a previously undocumented malware coded in...
As many as seven malicious Android apps discovered on the Google Play Store masqueraded as antivirus solutions to deploy a banking trojan...
CISA is known for publishing various reports and remediations for cyberattacks. They release a list of many known exploited vulnerabilities which are...
In its most recent statement, the Cybersecurity and Infrastructure Security Agency (CISA) added 15 new vulnerabilities to its Catalog of Known Exploited...
A trip into the dark corners of Telegram, which has become a magnet for criminals peddling everything from illegal drugs to fake...
Cybersecurity specialists report the detection of a new phishing campaign dedicated to the delivery of the AsyncRAT Trojan hidden in an HTML...