cybersecurity

Shut Down Phishing Attacks -Detection & Prevention ChecklistShut Down Phishing Attacks -Detection & Prevention Checklist

Shut Down Phishing Attacks -Detection & Prevention Checklist

In today's interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat. By masquerading as…

4 months ago
LightSpy Malware Actively Targeting MacOS DevicesLightSpy Malware Actively Targeting MacOS Devices

LightSpy Malware Actively Targeting MacOS Devices

BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be a macOS variant targeting Intel or…

11 months ago
Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection ServicesChinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services

Chinese Botnet As-A-Service Bypasses Cloudflare & Other DDoS Protection Services

A large botnet-as-a-service network originating from China was discovered, which comprises numerous domains, over 20 active Telegram groups, and utilizes…

11 months ago
1,200+ Vulnerabilities Detected In Microsoft Products In 20231,200+ Vulnerabilities Detected In Microsoft Products In 2023

1,200+ Vulnerabilities Detected In Microsoft Products In 2023

Hackers often focus on flaws in Microsoft products since they are commonly employed in various institutions and personal computers, which…

11 months ago
Hacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM SwapsHacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM Swaps

Hacker Offers Upto $300 To Mobile Networks Staff For Illegal SIM Swaps

A SIM Swap Scam or SIM Cloning Scam exploits a vulnerability in a two-factor authentication (2FA) system that relies on…

11 months ago
CrushFTP Servers Zero-day Under Active Attack: Update NowCrushFTP Servers Zero-day Under Active Attack: Update Now

CrushFTP Servers Zero-day Under Active Attack: Update Now

CrushFTP is a file transfer server that supports secure protocols, offers easier configuration, and offers powerful monitoring tools. It also…

11 months ago
SoumniBot Exploiting Android Manifest Flaws to Evade DetectionSoumniBot Exploiting Android Manifest Flaws to Evade Detection

SoumniBot Exploiting Android Manifest Flaws to Evade Detection

A new banker, SoumniBot, has recently been identified. It targets Korean users and is incredible by using an unusual method…

12 months ago
Cisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH ServicesCisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH Services

Cisco Warns Of Massive Brute-Force Attacks Targeting VPNs & SSH Services

Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission.  By…

12 months ago
Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable To RCE AttacksThousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable To RCE Attacks

Thousands Of Internet-Exposed Ivanti VPN Appliances Vulnerable To RCE Attacks

In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant…

12 months ago
Alpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows ComputersAlpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows Computers

Alpha Ransomware Uses Living-Off-The-Land Tools To Attack Windows Computers

Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by…

1 year ago