Dridex operators launch a social engineering scam that promises victims a $100 gift card but delivers a banking Trojan. The operators behind Dridex have a nefarious...
Media agencies are increasingly facing threats of cyberattacks not just by hit-and-run threat actors but also sophisticated and well-skilled state-sponsored APT groups. Attackers are using several...
Emotet, the nefarious banking trojan that evolved into a downloader, is active again just days before Christmas. The attackers are already known for using various local...
In the light of SolarWinds supply chain attack, the National Security Agency described two techniques cybercriminals are using to escalate access from hacked local networks to...
A Magecart skimming group has recently hacked dozens of online stores to deploy an unnamed RAT on compromised e-commerce sites. The advanced RAT was used as...
Citrix has confirmed today that an ongoing ‘DDoS attack pattern’ using DTLS as an amplification vector is affecting Citrix Application Delivery Controller (ADC) networking appliances with...
The LPE bug could allow an attacker to install programs; view, change, or delete data; or create new accounts with full user rights. A high-severity Windows...
The Golden Gate also known as the Mercy Gate (R) and the Dome of the Rock at the Al-Aqsa mosques compound in Jerusalem’s Old City(photo credit:...
Sangoma disclosed a data breach after files were stolen during a recent Conti ransomware attack and published online. Sangoma is a voice over IP hardware and...
Hackers affiliated with the Russian government have reportedly accessed emails from at least one company in the private sector and accessed Microsoft cloud customers’ information through...