Anupriya
Cyber Security News
Google Launches Shielded Email to Keep Your Address Hidden from Apps
Google is rolling out a new privacy-focused feature called Shielded Email, designed to prevent apps and services from accessing users’ primary email addresses during sign-ups.The...
cyber security
Hackers Using PowerShell and Microsoft Legitimate Apps to Deploy Malware
Cybersecurity experts are warning of an increasing trend in fileless attacks, where hackers leverage PowerShell and legitimate Microsoft applications to deploy malware without leaving...
Amazon
JavaGhost: Exploiting Amazon IAM Permissions for Phishing Attacks
Unit 42 researchers have observed a threat actor group known as JavaGhost exploiting misconfigurations in Amazon Web Services (AWS) environments to conduct sophisticated phishing...
cyber security
New Poco RAT Via Weaponized PDF Attacking Users to Capture Sensitive Data
A new variant of malware, dubbed "Poco RAT," has emerged as a potent espionage tool in a campaign targeting Spanish-speaking users in Latin America....
Cyber Security News
U.S. Suspends Cyberattacks Against Russia
The United States has suspended offensive cyber operations against Russia under an order issued by Defense Secretary Pete Hegseth, according to multiple confirmed reports.The...
cyber security
Hackers Abused Google and PayPal’s Infrastructure to Steal Users Personal Data
Cybersecurity researchers have uncovered a sophisticated phishing campaign leveraging Google Ads and PayPal’s infrastructure to deceive users and steal sensitive personal data.The attackers...
cyber security
Njrat Exploits Microsoft Dev Tunnels for C2 Communication
A new campaign involving the notorious remote access trojan (RAT) Njrat has been uncovered, leveraging Microsoft's Dev Tunnels service for command-and-control (C2) communication.This...
cyber security
North Korean IT Workers Hide Their IPs Using Astrill VPN
Security researchers have uncovered new evidence that North Korean threat actors, particularly the Lazarus Group, are actively using Astrill VPN to conceal their true...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.