Hackers Abuse 13,000 subdomains of Popular Brands In Phishing Campaign
In a seemingly impossible act, nearly 8000 domains were discovered to be compromised by threat actors for malicious scam campaigns...
Read more →In a seemingly impossible act, nearly 8000 domains were discovered to be compromised by threat actors for malicious scam campaigns...
Read more →In a groundbreaking advisory, cybersecurity agencies from the Five Eyes intelligence alliance have detailed the sophisticated tactics, techniques, and procedures...
Read more →A cybersecurity company data breach could be extremely damaging as it not only compromises sensitive client information but also corrupts...
Read more →Steganography is employed by threat actors to hide malicious payloads in benign files such as pictures or documents. By using...
Read more →The current large surge in cyber threats has left many organizations grappling for security, so ThreatHunter.ai is taking decisive action....
Read more →The “Security 360: Annual Trends Report 2024” provides a comprehensive overview of the evolving cybersecurity landscape, focusing on device risks,...
Read more →Russian authorities have successfully dismantled a notorious ransomware gang known as SugarLocker, arresting three of its alleged members. The group,...
Read more →A new sophisticated malware, which is written in C# and has sophisticated functionalities, has been discovered. This new malware has...
Read more →Concerning a development for internet security, a new form of website malware known as “Angel Drainer” has been increasingly targeting...
Read more →The upsurge of Apple products has made Mac users the prime targets for hackers who use malware to exploit them. ...
Read more →A new Python automation framework has been released for risk identification in generative AI. This new framework has been named...
Read more →February 24, 2024 – Phylum, a leader in cybersecurity research, has unveiled a sophisticated malware campaign aimed at software developers...
Read more →