Fake Cisco Webex Google Ads abuse tracking templates to push malware
Threat actors use Google Ads tracking templates as a loophole to create convincing Webex software search ads that redirect users...
Read more →Threat actors use Google Ads tracking templates as a loophole to create convincing Webex software search ads that redirect users...
Read more →Sep 14, 2023THNSupply Chain / Malware A download manager site served Linux users malware that stealthily stole passwords and other...
Read more →A high-severity vulnerability in Kubernetes can be exploited to achieve remote code execution (RCE) on all Windows endpoints within the...
Read more →Employee offboarding is no one’s favorite task, yet it is a critical IT process that needs to be executed diligently...
Read more →Hacker collective ‘Sylhet Gang – SG’ claimed responsibility for cyber attacks on two Indian banks — The City Union Bank...
Read more →Orca Security has published details on eight cross-site scripting (XSS) vulnerabilities impacting Azure HDInsight, which could be exploited to access...
Read more →The ALPHV/BlackCat ransomware operation appears to be behind the ongoing cyber attack on US hospitality and leisure operator MGM Resorts,...
Read more →In the wake of a recent Mom’s Meals data breach, Purfoods LLC now faces a formidable class action lawsuit, as...
Read more →North Korean hackers are suspected of stealing roughly $53 million worth of cryptocurrency from crypto exchange CoinEx, after a private...
Read more →The iPhone of a Russian journalist was infected with the Pegasus spyware Pierluigi Paganini September 14, 2023 The iPhone of...
Read more →One of Europe’s most powerful supercomputers is being built in Bristol to provide a national resource for researchers and industry...
Read more →A LockBit affiliate has been observed deploying a new ransomware family in a recent attack, after LockBit’s execution was blocked,...
Read more →