[ad_1] Apple patched three new zero-day vulnerabilities exploited in attacks installing triangulation spyware on iPhones via no-click iMessage exploits. "Apple is aware of a report that this issue may have been actively exploited against versions of iOS released prior to…
[ad_1] The Federal Trade Commission (FTC) says Amazon allegedly used dark patterns to trick millions of users into signing up for its Prime program and trick them into making it as difficult as possible to cancel auto-renewing subscriptions. In the…
[ad_1] The world of cybercrime is changing rapidly. Threat actors, ransomware gangsmalware developers and others are increasingly leaving the "traditional" dark web (Tor sites) for Illegal Telegram channels specializing in cybercrime. This To burst The article will examine the reasons…
[ad_1] The Chinese state-sponsored hacking group tracked as APT15 was observed using a new backdoor codenamed "Graphican" in a new campaign between late 2022 and early 2023. APT15, also known as Nickel, Flea, Ke3Chang and Vixen Panda, are Chinese hackers…
[ad_1] A cyber espionage and hacking campaign being tracked as "RedClouds" uses custom malware "RDStealer" to automatically steal data from shared drives over Remote Desktop connections. The malicious campaign was discovered by Bitdefender Labswhose researchers have seen hackers target systems…
[ad_1] VMware updated a security advisory released two weeks ago to warn customers that a now-patched critical vulnerability allowing remote code execution is being actively exploited in attacks. "VMware has confirmed that a CVE-2023-20887 exploit has occurred in the wild,"…
[ad_1] A new DDoS-as-a-Service botnet called "Condi" emerged in May 2023, exploiting a vulnerability in TP-Link Archer AX21 (AX1800) Wi-Fi routers to build an army of bots to carry out attacks. AX1800 is a popular Linux-based dual-band (2.4GHz + 5GHz)…
[ad_1] The ransomware operation behind a cyberattack on the University of Manchester has started sending emails to students, warning that their data will soon be leaked after an extortion request was not met. paid. Threat actors claim they stole 7TB…
[ad_1] Microsoft is working to address a known issue affecting Outlook for Microsoft 365 customers causing slow startups and crashes as if Outlook Offline Data Files (OST) were synced right after launch. However, no new OST files are created and…
[ad_1] An unknown threat actor brutally forces Linux SSH servers to install a wide range of malware, including the Tsunami DDoS (distributed denial of service) bot, ShellBot, log scrubbers, privilege escalation tools, and malware miner. XMRig coins (Monero). SSH (Secure…
Recent Posts
- ‘Evil Telegram’ Android apps on Google Play infected 60K with spyware
- Google rolls out Privacy Sandbox to use Chrome browsing history for ads
- Microsoft Teams phishing attack pushes DarkGate malware
- The Week in Ransomware – September 8th 2023
- Notepad++ 8.5.7 released with fixes for four security vulnerabilities
Recent News
-
Hackers steal Steam accounts in new…
September 13, 2022 -
New PsExec spin-off allows hackers to…
September 13, 2022 -
Hackers hack software provider for Magento…
September 13, 2022
Work Together
Let us help you protect your business from all malware, spyware and ransomware attacks.