Tushar Subhra

Beware Of New BingoMod Android Malware Steals Money & Formats Device

The wide use and the huge user base of Android often lucrative the threat actors.  As threat actors often use…

3 months ago

Voice Over Wi-Fi Vulnerability Let Attackers Eavesdrop Calls And SMS

Users use Voice Over Wi-Fi (VoWiFi) quite frequently nowadays, as it's a technology that enables them to make voice calls…

3 months ago

Proofpoint’s Email Protection Let Attackers Send Millions Of Phishing Emails

Hackers use phishing emails to mislead recipients into providing personal data like usernames, passwords, credit card numbers, or social security…

3 months ago

Hackers Exploiting ESXi Hypervisor Auth Bypass Flaw For Ransomware Attacks

Hackers prefer ransomware attacks primarily because they offer the highest chance of financial gain. By locking victims' information systems and…

3 months ago

SocGholish Malware Attacking Windows Users Using Fake Browser Update

The SocGholish downloader has been in operation since 2017 and it is still evolving. This malware, which poses as a…

3 months ago

AcidPour Malware Attacking Linux Data Storage Devices To Wipe Out Data

In March 2024, a new variant of the AcidRain wiper malware dubbed “AcidPour” was noticed. It targets Linux data storage…

3 months ago

Malicious Python Package Attacking macOS Developers To Steal Google Cloud Logins

Hackers continuously exploit malicious Python packages to attack developer environments and inject harmful code that enables them to steal sensitive…

3 months ago

PKfail, Critical Firmware Supply-Chain Issue Let Attackers Bypass Secure Boot

Hackers often attack secure boot during the boot process to execute unauthorized code, which gives them the ability to bypass…

3 months ago

North Korean Onyx Sleet Using Group Of Malware And Exploits to Gain Intelligence

Onyx Sleet, a cyber espionage group also known as SILENT CHOLLIMA, Andariel, DarkSeoul, Stonefly, and TDrop2, mainly targets the military,…

3 months ago

Chinese Hackers Using Shared Framework To Create Multi-Platform Malware

Shared frameworks are often prone to hackers' abuses as they have been built into various applications, which offer a range…

3 months ago