Cyber Security News

DoJ Launches Critical National Security Program to Protect Americans’ Sensitive DataDoJ Launches Critical National Security Program to Protect Americans’ Sensitive Data

DoJ Launches Critical National Security Program to Protect Americans’ Sensitive Data

The U.S. Department of Justice has launched a landmark initiative to block foreign adversaries—including China, Russia, and Iran—from exploiting commercial…

2 days ago
FortiGate 0-Day Exploit Allegedly Up for Sale on Dark WebFortiGate 0-Day Exploit Allegedly Up for Sale on Dark Web

FortiGate 0-Day Exploit Allegedly Up for Sale on Dark Web

A chilling new development in the cybersecurity landscape has emerged, as a threat actor has reportedly advertised an alleged zero-day…

2 days ago
Alleged FUD Malware ‘GYware’ Advertised on Hacker Forum for $35/MonthAlleged FUD Malware ‘GYware’ Advertised on Hacker Forum for $35/Month

Alleged FUD Malware ‘GYware’ Advertised on Hacker Forum for $35/Month

A new Remote Access Trojan (RAT) known as "GYware" is being marketed on a popular hacker forum at an affordable…

2 days ago
Kaspersky Shares 12 Essential Tips for Messaging App Security and PrivacyKaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

Kaspersky Shares 12 Essential Tips for Messaging App Security and Privacy

In an era where instant messaging apps like WhatsApp, Telegram, Signal, iMessage, Viber, and WeChat dominate personal and professional communication,…

2 days ago
Threat Actors Manipulate Search Results to Lure Users to Malicious WebsitesThreat Actors Manipulate Search Results to Lure Users to Malicious Websites

Threat Actors Manipulate Search Results to Lure Users to Malicious Websites

Cybercriminals are increasingly exploiting search engine optimization (SEO) techniques and paid advertisements to manipulate search engine results, pushing malicious websites…

4 days ago
Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android MalwareHackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Hackers Imitate Google Chrome Install Page on Google Play to Distribute Android Malware

Cybersecurity experts have unearthed an intricate cyber campaign that leverages deceptive websites posing as the Google Play Store to distribute…

4 days ago
Dangling DNS Attack Allows Hackers to Take Over Organization’s SubdomainDangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Dangling DNS Attack Allows Hackers to Take Over Organization’s Subdomain

Hackers are exploiting what's known as "Dangling DNS" records to take over corporate subdomains, posing significant threats to organizations' security…

4 days ago
HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi EnvironmentsHelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

HelloKitty Ransomware Returns, Launching Attacks on Windows, Linux, and ESXi Environments

Security researchers and cybersecurity experts have recently uncovered new variants of the notorious HelloKitty ransomware, signaling its resurgence with attacks…

4 days ago
RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors EmergeRansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

RansomHub Ransomware Group Hits 84 Organizations as New Threat Actors Emerge

The RansomHub ransomware group has emerged as a significant danger, targeting a wide array of industries across the globe. In…

4 days ago
Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious ActivityThreat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat Actors Leverage Email Bombing to Evade Security Tools and Conceal Malicious Activity

Threat actors are increasingly using email bombing to bypass security protocols and facilitate further malicious endeavors. Email bombing, known also…

5 days ago