Specialists from Cybersecurity and Infrastructure Security Agency (CISA) announced the launch of a companion dashboard based on the Splunk tool that will...
A cybercriminal group is deploying a phishing campaign that uses a fraudulent website to collect Microsoft Office 365 credentials by creating html...
According to Kaspersky researchers, Cycldek, a Chinese APT group is targeting Vietnam’s government and military organizations in a new cyberespionage campaign. According...
A new wave of malware threatens Gigaset mobile devices. According to German blogger Günter Born, who first reported the issue, this new...
Google has removed FlixOnline, a fake Netflix app for deploying wormable malware targeting WhatsApp users to spread itself. The primary aim behind...
A group of threat actors maintains an active attack targeting GitHub Actions systems with the intention of extracting cryptocurrency in a hacking...
The data was leaked earlier today on an infamous hacker forum without users’ Facebook accounts passwords. For the last couple of years,...
A couple of months ago the French authorities detailed the operation of Operation Venetic, with which they managed to compromise the security...
During the first quarter of 2021, denial of service (DoS) attacks became one of the world’s leading cybercriminal trends, in part thanks...
MobiKwik has denied the breach and accused the security researcher who initially reported the incident as “a media-crazed so-called security researcher” who...
This 5G vulnerability allows data extraction and DoS attacks between different network slices on a mobile operator leaving enterprise customers exposed to...
The hackers were using malware campaigns to target iOS and Android devices used by Uyghurs living outside China including journalists. Facebook has...
While white-hat hackers get paid for reporting flaws this particular researcher was reported to the police after responsibly disclosing a data leak....
The malware is also capable of controlling the device’s front and back camera to take photos periodically. The IT security researchers at...
The malware can also intercept text messages regardless of the fact that SMS-based two-factor authentication may be in use. A Trojan malware...
The credential-stealing malware was found in keygen and Cracks-related websites to circumvent licensing restrictions to legit software. The IT security researchers at...
Here are five security checks that are necessary to secure your website from cyber-attacks while it is in the development phase –...