Cyber Security News
Windows Computer Hit with AgentTesla Malware to Steal Data
AgentTesla is a notorious malware that functions as a keylogger and information stealer. By logging keystrokes and capturing screenshots on infected systems, this notorious malware...
Cyber Security News
New DLL Hijacking Technique Let Attackers Bypass Windows Security
DLL hijacking is a technique where a malicious DLL (Dynamic Link Library) is placed in a directory that a vulnerable application searches before the...
Cyber Security News
JaskaGO Malware Attacking Windows and macOS Operating Systems
Due to the widespread use and popularity of Windows and macOS, threat actors often target these platforms. Windows is a common target because it dominates...
CVE/vulnerability
8220 Hacker Group Attacking Windows & Linux Web Servers
The 8220 hacker group, which was first identified in 2017 by Cisco Talos, is exploiting both Windows and Linux web servers with crypto-jacking malware....
Antimalware
Windows Defender Quarantine Folder Metadata Recovered for Forensic Investigations
Windows Defender is a built-in antivirus and anti-malware software developed by Microsoft for Windows operating systems. It provides real-time protection against various threats, including:-VirusesSpywareRansomwareCybersecurity researchers...
Cyber Security News
MrAnon Stealer Attacking Windows Users Via Weaponized PDF Files
Phishing emails targeting Windows users were discovered, tricking users into opening a malicious PDF file called "MrAnon Stealer" that spreads malware by using fake...
Cyber Security News
Windows Hello Fingerprint Authentication Exploited on Microsoft, Dell, & Lenovo Laptops
Microsoft Windows Hello Fingerprint authentication was evaluated for security over its fingerprint sensors embedded in laptops.This led to the discovery of multiple vulnerabilities that...
Cyber Security News
Windows11 Themes vulnerability Let Attackers Execute Arbitrary Code
An Arbitrary code execution vulnerability has been found in Windows 11. This vulnerability is a result of several factors, such as a Time-of-Check Time-of-Use...