New MalasLocker Ransomware Attacks users of Zimbra servers
A Notorious MalasLocker Ransomware, which has been active since March 2023, targets Zimbra servers and demands charity donations instead of Ransom. This group mostly targets…
A Notorious MalasLocker Ransomware, which has been active since March 2023, targets Zimbra servers and demands charity donations instead of Ransom. This group mostly targets…
Vishing’s popularity has surged significantly in recent years, and this phenomenon is gradually destroying the trust factor in unknown calls from numbers that are unknown…
Mastodon is an open-source self-hosted social networking service company that is maintained as a non-profit. The platform is similar to Twitter, with a lot more…
RomCom is a RAT – that enables remote access/control over devices to exfiltrate sensitive information for financial gain, now being used in geo politically-motivated attacks…
The hacker claims to have stolen Razer’s data, which allegedly includes source code, encryption keys, database access logins, and backend access credentials. A threat actor…
A tool that automates the delivery of malware from external attackers to target employees’ Microsoft Teams inbox has been released. TeamsPhisher (Source: Alex Reid) About…
A recently patched vulnerability in Ubiquiti EdgeRouter and AirCube devices could be exploited to execute arbitrary code, vulnerability reporting firm SSD Secure Disclosure warns. Tracked…
Most evidence for RTCC effectiveness, however, is anecdotal, and there is a real lack of studies into how effective they really are. In Detroit, a…
The breach, which occurred in early 2022, was reportedly the result of the exploitation of an undisclosed vulnerability in Revolut’s payment systems. Revolut, a global…
Lockheed Martin Corporation, a prominent American arms, defense, information security, and technology company, recently found itself in the crosshairs of a cyber attack claimed by…
ICMP protocol is mainly used for error handling and primarily used for network devices (routers). Many different types of errors exist in the network layer…
Cyber Threat intelligence is one of the most critical concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage activities; the traditional…