A recent rise in data breaches from illegal Chinese OTT platforms exposes that user information, including names and financial details,…
Hackers target vaults, buckets, and secrets to access some of the most classified and valuable information, including API keys, logins,…
Several phishing campaign kits have been used widely by threat actors in the past. One popular PhaaS (Phishing-as-a-Platform) was Caffeine,…
Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes. Resecurity researchers have recently revealed that…
A cybercriminal group is selling and distributing a sophisticated phishing kit called "V3B" through Phishing-as-a-Service (PhaaS) and self-hosting methods, which…
The ransomware landscape is rapidly diversifying in 2024, with a surge in new extortion groups as established attackers continue to…
Gift cards are attractive to hackers since they provide quick monetization for stolen data or compromised systems. Reselling gift cards…
Researchers identified a PDF exploit targeting Foxit Reader users that uses a design flaw that presents security warnings with a…
Hackers target smart homes due to the increased interconnected devices with often insufficient security measures. Smart homes provide a wealth…
The Polish computer emergency response team CERT.pl has issued a warning about an ongoing cyberattack campaign by the notorious APT28…