cybersecurity

Shut Down Phishing Attacks -Detection & Prevention Checklist

In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat. By masquerading as…

4 weeks ago

LightSpy Malware Actively Targeting MacOS Devices

BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be a macOS variant targeting Intel or…

8 months ago

Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services

A large botnet-as-a-service network originating from China was discovered, which comprises numerous domains, over 20 active Telegram groups, and utilizes…

8 months ago

1,200+ Vulnerabilities Detected In Microsoft Products In 2023

Hackers often focus on flaws in Microsoft products since they are commonly employed in various institutions and personal computers, which…

8 months ago

Hacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM Swaps

A SIM Swap Scam or SIM Cloning Scam exploits a vulnerability in a two-factor authentication (2FA) system that relies on…

8 months ago

CrushFTP Servers Zero-day Under Active Attack: Update Now

CrushFTP is a file transfer server that supports secure protocols, offers easier configuration, and offers powerful monitoring tools. It also…

8 months ago

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is incredible by using an unusual method…

8 months ago

Cisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH Services

Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission.  By…

8 months ago

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable To RCE Attacks

In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant…

9 months ago

Alpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows Computers

Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by…

10 months ago