A recently discovered Android subscription malware called ‘Fleckpe’ has surfaced on Google Play Store. This insidious malware disguises itself as an authentic application and has already...
Police confiscated the illicit “Monopoly Market” dark web marketplace and arrested 288 people buying or selling drugs on the dark web as part of an operation...
Airtag, Smart tags are devices used to find the location of lost items like Luggage, keys, purses, or mobile phones. These location trackers are very handy...
Protecting employees from harmful content was a far more straightforward task once upon a time. COVID-19 changed all of that in an instant. The new hybrid...
The cybersecurity security researchers at Sophos recently detected the “Dragon Breath” APT group (aka Golden Eye Dog, APT-Q-27) using complex DLL sideloading variations to avoid detection....
Offline since February, the new system will have improved cybersecurity countermeasures. A critical U.S. Marshals Service computer system that has been offline since February after suffering a ransomware...
Recently, Zyxel, the networking equipment manufacturer, has issued critical security patches for its firewall devices to fix a vulnerability allowing RCE on the affected systems. This...
Introduction As organizations move towards digitization, security has become a significant part of their operations. Software-Defined Perimeter (SDP) and Virtual Private Networks (VPN) are two of the most extensively used security...
Researchers from Threatmon uncovered a targetted PowerShell backdoor malware attack from APT41 that bypasses the detections and allows threat actors to execute commands, download and upload...
As federal officials call for tech firms to take more responsibility for the security of their products, some members of Congress and industry voices have highlighted...
Recent Comments