Microsoft warns that threat actor DEV-0139 targets cryptocurrency investment companies using Telegram groups to access the VIP customers of those [...]

Microsoft warns that threat actor DEV-0139 targets cryptocurrency investment companies using Telegram groups to access the VIP customers of those [...]
Linux PRoot utility has been abused by hackers in BYOF (Bring Your Own Filesystem) attacks to store Linux malware. The [...]
According to Dr.Web's October review of virus activity, a large set of Android malware, phishing, and adware apps have been [...]
North Korean hacking group known as Lazarus has launched a new attack using the fake cryptocurrency app under the made-up [...]
Data wiper CryWiper, discovered by Kaspersky this fall, is actively targeting Russian courts and mayors' offices. CryWiper disguises itself as [...]
According to security researchers, vulnerabilities in mobile apps for Hyundai and Genesis car models after 2012 can be exploited to [...]
Trigona ransomware has been known for quite a while, but previously it wasn't branded and used email for ransom payment [...]
Windows 11 Insider build just got released to the Dev Channel and brought various new features and Taskbar Search improvements. [...]
An advanced threat actor Bahamut that was previously involved in cyber espionage has been discovered to distribute trojanized versions of [...]
If you want to improve your device's protection against various threats, make sure you don't miss various Black Friday deals! [...]
Microsoft has stated that they are aware and are working on the fix to Windows Remote Desktop freezing on Windows [...]
Threat actors abuse the Microsoft Azure Web Apps service to create a large number of malicious phishing websites disguised as [...]
AXLocker ransomware not only demands a ransom from its victims after encrypting their files but it also tracks when users [...]
Security researcher ProxyLife has discovered a new QBot phishing campaign where attackers abuse Windows Mark Of The Web zero-day by [...]
ProxyNotShell is a combination of two high-severity vulnerabilities in Microsoft Exchange, which allow threat actors to run PowerShell in the [...]
Mirai-based botnet 'RapperBot' was first discovered last August targeting Linux servers. The recent 'RapperBot' campaign infects IoT devices to later [...]
North Korean hackers have been spotted using an updated version of DTrack backdoor to target various organizations in Europe and [...]
Cybersecurity researcher David Schütz accidentally found a way to bypass the lock screen on his up-to-date Google Pixel 6 and [...]
The issue with the gaming performance of some games on Windows 11 22H2 has been acknowledged by Microsoft. The problem [...]
Microsoft has released a fix for the recently exploited vulnerability that prevented Mark of the Web (MotW) flags from propagating [...]
Recently discovered malware called 'StrelaStealer' was seen to steal Outlook and Thunderbird email accounts, targeting Spanish users. 'StrelaStealer's vector of [...]
Chrome browser botnet 'Cloud9' uses fake extensions distributed by websites pushing fake Adobe Flash Player updates to steal users' data, [...]
According to a Windows researcher Albacore, Microsoft is promoting their own products using the Windows 11 sign-out menu, which appears [...]
Microsoft's Windows 11 22H2 virtual machines can be downloaded for free until January 10, 2023. After that date, users who [...]
Robin Banks phishing-as-a-service platform has been known for its campaigns targeting big US banks, such as Bank of America, Capital [...]
RomCom's new campaign involves creating fake websites disguised as known software brands (like SolarWinds NPM and KeePass) to distribute RATs [...]
A big number of newspaper sites belonging to an undisclosed media company have been compromised to push the SocGholish JavaScript [...]
Dropbox disclosed the security breach which resulted in attackers stealing 130 GitHub code repositories with Dropbox data. Dropbox stated that [...]
Previously Windows never provided users a way to clean their registry entries and folders for all apps, which is why [...]
Recently Outlook users who already added their accounts to Outlook profiles and those who are trying to sign in using [...]
The Cranefly group also known as UNC3524 has been seen to use a unique method of controlling their malware - [...]
A new security update released by Apple addresses recent zero-day (CVE-2022-42827) that affects iPhones and iPads and was used in [...]
Apple's new security advisory states that the ninth zero-day used in attacks against iPhones since the start of the year [...]
Threat actors have been seen to abuse Windows zero-day which allows malicious JavaScript Files to bypass Mark-of-the-Web security warnings. Mark-of-the-Web [...]
According to security researchers, hackers are still exploiting the critical VMware vulnerability (CVE-2022-22954) that allows them to drop various malware [...]
The latest Firefox version brought a new feature that allows the convenient editing of PDF files. The feature allows users [...]
The threat actor is supposedly selling a brand new UEFI bootKit named BlackLotus on hacking forums, which is commonly linked [...]
Ducktail phishing campaign, linked to Vietnamese hackers, is actively stealing Facebook accounts, cryptocurrency wallets, and browser data using new PHP [...]
The Dutch National Police, in collaboration with cybersecurity firm Responders.NU got 155 decryption keys from the DeadBolt ransomware gang by [...]
An unofficial Android version of WhatsApp called 'YoWhatsApp' has been discovered to steal access keys for users' accounts. YoWhatsApp has [...]