Beware Of New Money Laundering Attack Targeting UPI Users
Threat actors target UPI users as UPI offers a convenient platform for transferring money, often with less severe security than traditional banking systems. Due to…
Threat actors target UPI users as UPI offers a convenient platform for transferring money, often with less severe security than traditional banking systems. Due to…
Over 30,000 individuals have been left vulnerable after a third-party data breach involving Fidelity Investments Life Insurance Company (FILI). The breach, orchestrated through Infosys McCamish…
A vulnerability, CVE-2023-36049 has been identified in the Microsoft .NET Framework and Visual Studio, posing a serious threat to the integrity of FTP servers. If…
A critical vulnerability, CVE-2024-20301 has been identified in Cisco Duo Authentication for Windows Logon and Remote Desktop Protocol (RDP), posing a security risk to affected…
Cybersecurity experts at Cleafy Labs have exposed a sophisticated fraud campaign orchestrated by a group known as Copybara. This campaign, leveraging on-device fraud techniques, has…
The threat actor, who goes by the name “z0miner,” has been found to be attacking Korean WebLogic servers to distribute malware like miners, network tools,…
Two new zero-day vulnerabilities have been discovered in iOS and iPadOS 17.4 versions that could allow threat actors to bypass memory protections and perform arbitrary…
Cloudflare has announced the launch of a new firewall specifically designed to protect AI models. This pioneering initiative aims to address the growing concerns around…
Foxit Software has released an update for its Foxit PDF Reader 2024.1 and Foxit PDF Editor 2024.1 for Windows, addressing critical security vulnerabilities that could…
A hacking group has evolved with a new ransomware variant known as GhostLocker 2.0. This group, in collaboration with the Stormous ransomware operators, has initiated…
Malware can use the Notepad service to attack systems such as Windows and Linux since Notepad is a widely used application on most operating systems.…
Threat actors have been discovered to be using a new technique for deploying the CHAVECLOAK banking trojan to target users in Brazil. This trojan is…