Computer Security
Hackers Compromised Bangladesh Embassy Website that Drops Weaponized Word Document with Malware
Threat actors compromised the Bangladesh embassy in Cairo website and taking control to drops the weaponized word documents that contains privilege escalation flaw exploit...
Cyber Attack
Hackers Launching New Muncy Malware as .EXE File Worldwide via DHL Phishing Campaign
Cyber Criminals now distributing new dubbed Muncy malware as a EXE file format via DHL phishing campaigns to target the users around...
Computer Security
500px Hacked – Attackers Stolen 14.8 Million Users Personal Data
500px , an online photography community suffering a massive data breach that leaked 14.8 million users personal information by cybercriminals.500px global network for...
Computer Security
620 Million Online Accounts Data Stolen from 16 Hacked websites – Available in Dark Web for Sale
A new shocking report revealed that almost 620 million online account data from 20 famous websites currently hackers selling it in dark web for...
Apple
New Unpatched macOS Flaw Allow Hackers to Spy on Safari Browser History
Security Researcher discovered a vulnerability in macOS Mojave let malware apps bypass the privacy protection and read the safari browser web history.macOS Mojave...
Apple
Hackers Find New Ways to Use .EXE File Against macOS to Launch Malware that Bypass Protection & Steal Data
Yes, What you hear is something mysterious that the .EXE file runs on macOS is totally new right. but this strange activity uncovered by...
Computer Security
Hackers Launching Ursnif Malware via Weaponized office Document Using Steganography Technique
Cyber Criminals now distributing powerful ursnif malware via malicious Office Documents with multi-stage highly obfuscated PowerShell scripts to bypass security controls.ursnif is a banking...
Exploit
Hackers Launching Powerful Malware ExileRAT Via Weaponized Microsoft PowerPoint Document
Researchers observed a new malicious campaign that delivers a powerful ExileRAT malware via Microsoft powerpoint documents using previously used C2 server infrastructure.Attackers deliver the...