cybersecurity

Shut Down Phishing Attacks -Detection & Prevention Checklist

In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat. By masquerading as…

3 months ago

LightSpy Malware Actively Targeting MacOS Devices

BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be a macOS variant targeting Intel or…

10 months ago

Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services

A large botnet-as-a-service network originating from China was discovered, which comprises numerous domains, over 20 active Telegram groups, and utilizes…

10 months ago

1,200+ Vulnerabilities Detected In Microsoft Products In 2023

Hackers often focus on flaws in Microsoft products since they are commonly employed in various institutions and personal computers, which…

10 months ago

Hacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM Swaps

A SIM Swap Scam or SIM Cloning Scam exploits a vulnerability in a two-factor authentication (2FA) system that relies on…

10 months ago

CrushFTP Servers Zero-day Under Active Attack: Update Now

CrushFTP is a file transfer server that supports secure protocols, offers easier configuration, and offers powerful monitoring tools. It also…

10 months ago

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is incredible by using an unusual method…

10 months ago

Cisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH Services

Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission.  By…

10 months ago

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable To RCE Attacks

In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant…

11 months ago

Alpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows Computers

Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by…

1 year ago