Daily Threat Intelligence – May 02 – 2023
In the wake of cybercriminals increasingly attempting to break into iOS, iPadOS, and macOS devices, and with a few exploits...
In the wake of cybercriminals increasingly attempting to break into iOS, iPadOS, and macOS devices, and with a few exploits...
Cybercriminals are constantly devising new ways to evade detection by security software. In one such observation, researchers detected a change...
The abuse of Telegram has become a norm in the world of cybercrime. Of late, security researchers uncovered an unidentified...
The cyber adversaries abusing PaperCut flaws have been identified. Microsoft security team has reported that the recent attacks exploiting vulnerabilities...
Chinese cybercriminals were reported using new malware variants in their espionage attacks against South Africa and Nepal. The campaign includes...
The notorious Lazarus group has formulated a new malware family to threaten macOS users. The attackers have been discovered utilizing...
Promoting fake software downloads on search engines is a go-to tactic for cybercriminals. A recent discovery by cybersecurity experts has...
‘EvilExtractor’ - the name gives it away that nothing noble can be associated with it, let alone an education tool....
Google scrambles to address another high-severity zero-day in Chrome web browser, coming hot on the heels of Google releasing a...
Among the various attack vectors, unpatched vulnerabilities have always been a favored entrance route for threat actors to gain access...
Several critical sandbox escape disclosures have come to light in the past two weeks that allow attackers to execute malicious...
A rising trend has been identified among cybercriminals; they are using Action1 remote access software for reconnaissance activity and to...
Phishing attacks are a type of cyber attack where an attacker tries to trick you into revealing sensitive information, such...
With the U.S. reaching the end of its tax season, scammers are using this ideal time to target taxpayers. In...
Now you can protect yourself against BlackLotus UEFI bootkit attacks. The Incident Response team at Microsoft has pinpointed various stages...
Patch Tuesday is here! Microsoft, SAP, Adobe, Siemens, and Schneider Electric have rolled out security patch updates for their users....
Crypto exchanges are being targeted left, right, and center. A South Korean cryptocurrency exchange experienced a major attack that culminated...
Apple, as the maker of one of the most widely used devices, is also one of the most targeted brands....
Of late, security researchers stumbled across a group of English-speaking European teenagers who are offering services such as malware-as-a-subscription, hacking...
Cybercriminals can remotely open your garage door and even hijack any home alarm system. Now, that’s too much control. Recently,...
It seems we may have bumped across one of the fastest ransomware strains ever observed. Named Rorschach, it encrypts files...
Weekly Cyber Security Tip: Security Assessment and Testing One of the most important steps you can take to protect your...
Email inboxes of NATO, diplomats, and government and military officials are being targeted by an APT group whose operations appear...