Bhuvanesh
Press Release
ATPC Cyber Forum to Focus on Next Generation Cybersecurity and Artificial Intelligence Issues
White House National Cyber Director, CEOs, Key Financial Services Companies, Congressional and Executive Branch Experts will discuss industry priorities for 2025 and beyond The American...
Cyber Security News
New PySilon RAT Abusing Discord Platform to Maintain Persistence
Cybersecurity experts have identified a new Remote Access Trojan (RAT) named PySilon. This Trojan exploits the popular social platform Discord to maintain persistence on...
Cyber Security News
Konni APT Hackers Attacking Organizations with New Spear-Phishing Tactics
The notorious Konni Advanced Persistent Threat (APT) group has intensified its cyber assault on organizations using sophisticated spear-phishing tactics.Known for its stealth and...
Chrome
Google Chrome Security, Critical Vulnerabilities Patched
Google has updated its Chrome browser, addressing critical vulnerabilities that posed potential risks to millions of users worldwide.The latest Stable channel update, version...
Cyber Attack
Notorious WrnRAT Delivered Mimic As Gambling Games
WrnRAT is a new malware attack that cybercriminals have deployed by using popular gambling games like Badugi, Go-Stop, and Hold'em to disguise itself as...
Cyber Security News
New Windows Downgrade Attack Let Hackers Downgrade Patched Systems To Exploits
The researcher discovered a vulnerability in the Windows Update process that allowed them to downgrade critical system components, including DLLs, drivers, and the NT...
Cyber Security News
Hackers Use Fog Ransomware To Attack SonicWall VPNs And Breach Corporate Networks
Recent cyberattacks involving Akira and Fog threat actors have targeted various industries, exploiting a vulnerability (CVE-2024-40766) in SonicWall SSL VPN devices, where these attacks,...
Cyber Security News
RedLine and META Infostealers Infrastructure Seized by Authorities
An international coalition led by the U.S. Department of Justice has dismantled the infrastructure behind the notorious RedLine and META infostealers.These malware variants...
Join our community of SUBSCRIBERS and be part of the conversation.
To subscribe, simply enter your email address on our website or click the subscribe button below. Don't worry, we respect your privacy and won't spam your inbox. Your information is safe with us.