Cybersecurity Threats

FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware AttacksFlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks

FlyingYeti Exploits WinRAR Vulnerability For Targeted Malware Attacks

Ever since Russia's invasion of Ukraine on February 24, 2022, there have been heavy tensions between the nations and worldwide.…

11 months ago
Beware Of New Social Engineering Attack That Delivers Black Basta RansomwareBeware Of New Social Engineering Attack That Delivers Black Basta Ransomware

Beware Of New Social Engineering Attack That Delivers Black Basta Ransomware

Hackers exploit social engineering, which avoids technical security systems, by manipulating the psychology and behavior of a human being. Social…

12 months ago
IT Teams Beware! Weaponized WinSCP & PuTTY Delivers RansomwareIT Teams Beware! Weaponized WinSCP & PuTTY Delivers Ransomware

IT Teams Beware! Weaponized WinSCP & PuTTY Delivers Ransomware

Attackers launched a campaign distributing trojanized installers for WinSCP and PuTTY in early March 2024, as clicking malicious ads after…

12 months ago
Mal.Metrica Malware Hijacks 17,000+ WordPress SitesMal.Metrica Malware Hijacks 17,000+ WordPress Sites

Mal.Metrica Malware Hijacks 17,000+ WordPress Sites

Infected websites mimic legitimate human verification prompts (CAPTCHAs) to trick users, who often request seemingly innocuous clicks, resembling past CAPTCHA…

1 year ago
Threat Actors Renting Out Compromised Routers To Other CriminalsThreat Actors Renting Out Compromised Routers To Other Criminals

Threat Actors Renting Out Compromised Routers To Other Criminals

APT actors and cybercriminals both exploit proxy anonymization layers and VPN nodes to mask their malicious activities, while Pawn Storm,…

1 year ago
New Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail UsersNew Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail Users

New Tycoon 2FA Phishing Kit Attacking Microsoft 365 & Gmail Users

Hackers use 2FA (Two-Factor Authentication) phishing kits to overcome the additional security layer provided by 2FA.  These kits typically mimic…

1 year ago
13 Most Dangerous Cyber Attacks And How To Avoid Them13 Most Dangerous Cyber Attacks And How To Avoid Them

13 Most Dangerous Cyber Attacks And How To Avoid Them

Today's cyber adversaries are not mere amateurs but professional criminals aiming to steal data. As per the findings of Check…

2 years ago
10 Cybersecurity Threats in 2024 and How to Protect Yourself10 Cybersecurity Threats in 2024 and How to Protect Yourself

10 Cybersecurity Threats in 2024 and How to Protect Yourself

Cybersecurity Threats deal with emerging dangers and include protecting and preventing means against hacker attacks. New technologies are booming, and…

2 years ago