Hackers Attack Users With Malware Using Underground Call Centres
BazarLoader malware actors have started working with underground call centres to fool targets of their spamming campaign by making...
BazarLoader malware actors have started working with underground call centres to fool targets of their spamming campaign by making...
It is the first SD-WAN-class development that supports Russian encryption algorithms and is included in the Russian software registry.Sberbank's press...
Group-IB, a global threat hunting firm, has discovered traces of an ongoing phishing campaign targeting Indonesia’s largest banks that cybercriminals...
A new study revealing Apple and Google's monitoring of mobile devices is making headlines. It discusses how, despite the fact...
Browser lockers (aka browlocks) are a class of online threats that prevent the victim from using the browser and demand...
Ransomware gang demanded a $40,000,000 ransom to the Broward County Public Schools district, Florida. It is just the last attack...
PrivacySavvy experts discovered an OTP vulnerability in Airlift Express, which could lead to account hacks and exploits by cybercriminals. A...
The DHS CISA has issued a supplemental directive that requires all federal agencies to identify vulnerable Microsoft Exchange servers in...
The United States Department of Justice (DoJ) charged a Kansas man, for accessing and tampering with a public water system....
VMware has addressed a critical authentication bypass vulnerability in the VMware Carbon Black Cloud Workload appliance. VMware has addressed a...
Activision reported finding postings on hacking forums on YouTube by a threat actor promoting a Remote Access Trojan that can...
A newly discovered piece of Android malware shares the same capabilities found within many modern stalkerware-type apps—it can swipe images...
Passwords are a hot topic on social media at the moment, due to the re-emergence of a discussion about good...
Cybersecurity experts discovered fake variants of the jQuery Migrate plugin inserted in various sites that had unclear codes to launch...
Email security firm, Proofpoint has exposed a hacking group linked with the Iranian government targeting nearly two-dozen medical researchers in...
Malicious actors are now using novel ways to extract universities' data, and are threatening to share stolen data on dark...
Royal Dutch Shell became the latest corporation to witness an attack by the Clop ransomware group. The compromised servers were...
Ubiquiti Inc., a major provider of cloud-enabled Internet of Things (IoT) equipment such as routers, network video recorders, and surveillance...
One of the administrators for the DeepDotWeb dark web portal pleads guilty to receiving kickbacks from the operators of the...
VMware addressed two vulnerabilities in its vRealize Operations (vROps) product that can expose organizations to a significant risk of attacks...
Akamai has recently involved in the mitigation of two of the largest known ransom DDoS attacks, one of them peaked...
The data breach disclosed by Ubiquiti in January could be just the tip of the iceberg, a deeper incident could...
Citrix addressed vulnerabilities in Hypervisor that could be exploited by threat actors to execute code in a virtual machine to...
Researchers from Google’s Threat Analysis Group (TAG) reported that North Korea-linked hackers are targeting security researchers via social media. The...