A significant cybersecurity threat involving North Korean hackers exploiting LinkedIn as an entry point to infiltrate organizations. This attack has…
Pumakit is a sophisticated rootkit that leverages system call interception to manipulate file and network activity. It ensures persistence through…
A sophisticated Android malware campaign targeting users in South Asia, particularly in the Kashmir region of India has been recently…
Attackers are impersonating the Computer Emergency Response Team of Ukraine (CERT-UA) via AnyDesk to gain access to target computers. The…
With the Budget 2025 soon to be announced, India stands at a pivotal moment in its digital transformation journey, increasingly…
A group of researchers from Eindhoven University of Technology has unveiled a new findings that could significantly improve the efficiency…
The National Bureau of Investigation (NBI), the Philippines’ top investigative agency, has reportedly been compromised, exposing the sensitive data of…
The U.S. Department of the Treasury’s Office of Foreign Assets Control (OFAC) issued sanctions against two entities linked to major…
Elon Musk, the renowned CEO of Tesla and SpaceX, has made waves with a bold statement regarding the cybersecurity vulnerabilities…
Hackers have deployed malicious npm packages designed to exfiltrate Solana private keys through Gmail’s trusted infrastructure, as uncovered recently by…
January 17, 2025 – A cybercriminal campaign linked to Russia is deploying QR codes to access the WhatsApp accounts of…
A critical remote code execution (RCE) vulnerability designated as CVE-2024-53691 has been identified in the QNAP QTS/QuTS hero operating system….