Hackers Can Use HDMI Cables to Capture Your Passwords
Security researchers have discovered a new way that hackers can steal sensitive information, like passwords. This involves eavesdropping on HDMI cables, a concerning development for…
Security researchers have discovered a new way that hackers can steal sensitive information, like passwords. This involves eavesdropping on HDMI cables, a concerning development for…
Stay up to date with cybersecurity news! Our Weekly Cybersecurity Newsletter provides a curated summary of the most important updates, trends, and insights from the…
TgRat, a Telegram-controlled trojan, was discovered attacking Linux servers in an attempt to steal data from a compromised system. In 2022, the TgRat trojan was…
Threat actors have been exploiting the attack vector known as Sitting Ducks since at least 2019 to conduct malware delivery, phishing, brand impersonation, and data…
Security researchers have discovered a severe vulnerability in the Linux kernel that could allow attackers to gain full control over affected systems. Dubbed “SLUBStick,” the…
In mid-2022, Mandiant’s Managed Defense first uncovered UNC4393, the primary user of BASTA ransomware. This financially motivated threat cluster has attacked over 40 business entities…
A Russian threat actor known as Fighting Ursa (also referred to as APT28, Fancy Bear, and Sofacy) has been identified in a new campaign that…
Researchers from ANY RUN identified a malware distribution campaign dubbed DeerStealer that leverages deceptive websites masquerading as legitimate Google Authenticator download pages. The initial discovered…
A sophisticated phishing campaign targets Microsoft OneDrive users, employing social engineering to trick victims into executing malicious PowerShell scripts. The attack leverages a false sense…
Fresnillo PLC, the world’s largest primary silver producer, and Mexico’s largest gold producer has announced that it has been the target of a significant cybersecurity…
Threat actors masquerade as interviewers and send a ZIP file (onlinestoreforhirog.zip) to candidates as part of a fake interview, which contains legitimate files and a…
Threat actors exploit AI to make their attacks more effective through automation, scanning large data sets for security gaps and creating intricate phishing scams that…