[ad_1] Image: Creation of Bing The BlackCat (aka ALPHV) ransomware group runs malicious advertising campaigns to lure people to fake pages that mimic the official website of the WinSCP file transfer application for Windows, but instead push installers infested with…


[ad_1] A phishing campaign that security researchers have named SmugX and attributed to a Chinese threat actor is targeting embassies and foreign ministries in the UK, France, Sweden, Ukraine, the Czech Republic, Hungary and Slovakia since December 2022. Researchers at…

[ad_1] Cybersecurity researchers have released a new tool called "Snappy" that can help detect fake or malicious Wi-Fi hotspots that attempt to steal data from unsuspecting people. Attackers can create fake hotspots in supermarkets, cafes, and malls that masquerade as…

[ad_1] Microsoft's Edge browser recently improved its "Edge Secure Network" feature, which now offers 5GB of data, a significant increase from the previously offered 1GB. Edge Secure Network uses Cloudflare routing to encrypt your internet connection and secure your data…

[ad_1] Forget crypto spam accounts, Twitter has another problem that involves bots and accounts promoting adult content and infiltrating direct messages and interactions on the platform. And there doesn't seem to be an easy solution in sight. Although the problem…

[ad_1] Hundreds of thousands of FortiGate firewalls are vulnerable to a critical security issue identified as CVE-2023-27997, nearly a month after Fortinet released an update that fixes the problem. The vulnerability is a remote code execution with a severity score…

[ad_1] Starting today, Twitter is no longer accessible on web and mobile apps if you don't have an account, requiring all users to log in if they want to access the platform. If you are not already logged in, you…

[ad_1] A case of mistaken identity and other MOVEit Transfer data breaches continue to dominate the ransomware news cycle this week. This week, the New York City Department of Education revealed that the data from 45,000 students exposedAnd Siemens Energy…

[ad_1] Hackers are exploiting a zero-day privilege escalation vulnerability in the "Ultimate Member" WordPress plugin to compromise websites by bypassing security measures and registering malicious administrator accounts. Ultimate Member is a user profile and membership plugin that makes it easy…

[ad_1] Attackers behind an ongoing series of proxyjacking attacks are hacking vulnerable SSH servers exposed online to monetize them through proxyware services that pay to share unused Internet bandwidth. Like cryptojacking, which allows attackers to use hacked systems to mine…
Recent Posts
- ‘Evil Telegram’ Android apps on Google Play infected 60K with spyware
- Google rolls out Privacy Sandbox to use Chrome browsing history for ads
- Microsoft Teams phishing attack pushes DarkGate malware
- The Week in Ransomware – September 8th 2023
- Notepad++ 8.5.7 released with fixes for four security vulnerabilities
Recent News
-
Hackers steal Steam accounts in new…
September 13, 2022 -
New PsExec spin-off allows hackers to…
September 13, 2022 -
Hackers hack software provider for Magento…
September 13, 2022
Work Together
Let us help you protect your business from all malware, spyware and ransomware attacks.