Romanian national Mihai Ionut Paunescu, aka “Virus,” was sentenced to three years in prison by a Manhattan federal court for...
A MacBook is the closest a personal computer gets to perfection. While Windows-based computers are notorious for being laggy and slow, MacBooks are the epitome of...
The next feature update “Windows 10 May 2021 Update” is going to be a minor service pack style-like release with quality improvements and bug fixes. While...
Like other antivirus programs, Microsoft Defender will upload suspicious files to Microsoft to determine if they are malicious. However, some consider this a privacy risk and...
Dridex is active again; it has returned with phishing attacks masquerading as QuickBooks invoices. This ongoing phishing campaign started on April 19, and it targets users...
Babuk ransomware gang, which was discovered at the beginning of 2021, is known to target multiple sectors such as healthcare, manufacturing, and logistics. It has been...
Mount Locker, the infamous ransomware strain, has been discovered with several enhancements in its recent campaigns, including more sophisticated scripting, detection evasion, and anti-prevention features. According...
Zero-day vulnerabilities are among the deadliest threats leveraged by attackers to accomplish their malicious attacks. Everyone is aware of the damage caused by the recent ProxyLogon zero-day attacks....
The North Korea-based threat actor Lazarus had targeted e-commerce shops in 2019 and 2020 to steal payment card information. In those attacks, the attackers were experimenting...
The eSentire Threat Response Unit (TRU) has identified that attackers are using new techniques to lure business professionals to hacker-controlled websites hosted on Google Sites. Moreover,...
At the beginning of March, Microsoft discovered some zero-day vulnerabilities in its Exchange Servers were actively exploited by a hacking group known as Hafnium. Since then,...
Recent Comments