Hackers Use Google Ads to Deliver Bumblebee Malware
Threat actors frequently employ malicious Google Ads and SEO poisoning to spread malware. Recently, Secureworks’ Counter Threat Unit (CTU) researchers reported that Cyber attackers are…
Threat actors frequently employ malicious Google Ads and SEO poisoning to spread malware. Recently, Secureworks’ Counter Threat Unit (CTU) researchers reported that Cyber attackers are…
Japanese Cybersecurity experts have found that ChatGPT could write code for malware by entering a prompt that makes the AI believe it is in developer…
The Unit42 research team at Palo Alto Networks has recently discovered Trigona ransomware that attacks Windows with uncommon techniques and uses the Mimikatz exploitation tool…
LockBit ransomware gang targets Macs with its newly-developed encryptors for the first time, making them potentially the first significant ransomware group to aim at macOS.…
Google Cloud is making it’s Assured Open Source Software (Assured OSS) service available for Java and Python ecosystems without charge in response to the rising…
Threat actors have discovered a new technique to insert malicious code into websites. They are currently utilizing Eval PHP, an abandoned WordPress plugin. Mostly, website backdoors…
Millions of records containing sensitive information, including financial data and client personal documents, were disclosed by ICICI Bank. During the most recent inquiry, the Cybernews…
Transparent Tribe (aka APT36), an APT group based in Pakistan, has recently been found employing a stealthy tactic to distribute a new Linux Malware called…
Recently, the following agencies have published a joint advisory to warn of APT28, a Russian state-sponsored group that is found actively deploying the ‘Jaguar Tooth,’…
Recently, Google released an emergency security update to fix another Chrome zero-day vulnerability actively exploited in the wild. This zero-day flaw has been tracked as…
DNS security is critical in today’s world to protect against the growing threat of DNS attacks. The risk of financial loss, data theft, and reputational…
Morphisec Threat Labs researchers have recently exposed a sneaky loader called “in2al5d p3in4er” (Invalid Printer) that delivers Aurora information stealer malware through YouTube videos. Using…