[ad_1] A new PowerShell malware script named "PowerDrop" has been discovered to be used in attacks targeting the US aerospace defense industry. PowerDrop was discovered by Adlumin, which last month found a sample of the malware in the network of…
blog


[ad_1] The Federal Bureau of Investigation (FBI) warns of a growing trend of malicious actors creating deepfake content to carry out sextortion attacks. Sextortion is a form of online blackmail where malicious actors threaten their targets by publicly disclosing explicit…

[ad_1] Google released the monthly security update for the Android platform, adding fixes for 56 vulnerabilities, including five with a critical severity rating and one exploited since at least last December. The new security patch level 2023-06-05 includes a fix…

[ad_1] Over 60,000 Android apps disguised as legitimate apps have quietly installed adware on mobile devices while remaining undetected in the past six months. The discovery comes from the Romanian cybersecurity company Bitdefender which detected the malicious applications using a…

[ad_1] Stealer logs represent one of the main threat vectors for modern businesses. However, many security teams still focus on leaked credentials and ignore the significant threat posed by devices infected with infostealer malware. This how-to article from Flare will…

[ad_1] Outlook.com suffers a series of outages today after being taken down several times yesterday by hacktivists known as Anonymous Sudan claiming to carry out DDoS attacks on the service. This outage follows two major outages yesterday, creating widespread disruption…

[ad_1] Microsoft has agreed to pay a $20 million fine and change data privacy procedures for children to settle Federal Trade Commission (FTC) charges for violations of the Children's Online Privacy Protection Act (COPPA) . COPPA is a US federal…

[ad_1] Google released a security update for the Chrome web browser to address the third zero-day vulnerability exploited by hackers this year. “Google is aware that an exploit for CVE-2023-3079 exists in the wild,” reads the safety bulletin. Exploitation details…

[ad_1] Cybersecurity firm Kaspersky has released a tool to detect whether Apple iPhones and other iOS devices are infected with new "triangulation" malware. This malware was discovered by Kaspersky on its own network, reporting that it has infected multiple iOS…

[ad_1] The Clop ransomware gang told BleepingComputer they were behind the MOVEit Transfer data theft attacks, where a zero-day vulnerability was exploited to breach multiple companies' servers and steal data. This confirms Microsoft's Sunday Night attribution to hacking group they…
Recent Posts
- New PowerDrop PowerShell malware targets US aerospace industry
- Sextortionists make AI nudes from your social media images
- Android security update fixes Mali GPU flaw exploited by spyware
- Over 60,000 Android apps secretly installed adware in the past six months
- Dissecting the Dark Web Supply Chain: Stealer Logs in Context
Recent News
-
Hackers steal Steam accounts in new…
September 13, 2022 -
New PsExec spin-off allows hackers to…
September 13, 2022 -
Hackers hack software provider for Magento…
September 13, 2022
Work Together
Let us help you protect your business from all malware, spyware and ransomware attacks.