The Tycoon 2FA platform is a Phishing-as-a-Service (PhaaS) tool that enables cybercriminals to easily launch sophisticated phishing attacks targeting two-factor…
Jan 02, 2025Ravie LakshmananVulnerability / Data Protection Details have emerged about three now-patched security vulnerabilities in Dynamics 365 and Power…
Sir Alan Bates has “serious concerns” that the government’s budget for Post Office scandal compensation will be stretched to cover…
PLAYFULGHOST, a Gh0st RAT variant, leverages distinct traffic patterns and encryption, which spread via phishing emails and SEO poisoning of…
FeedSpot named Cybercrime Magazine no. 1 on it’s list of 20 Best Cybercrime Blogs you should follow in 2025. The best…
The CVE-2024-49112 vulnerability in Windows LDAP allows remote code execution on unpatched Domain Controllers, as a zero-click exploit leverages this…
A new ransomware strain, dubbed Nitrogen, has emerged as a significant threat over the past four months, targeting organizations across…
A cybersecurity researcher has demonstrated a method to bypass BitLocker encryption on Windows 11 (version 24H2) by extracting full volume…
Jan 02, 2025Ravie LakshmananCyber Espionage / Hacking German prosecutors have charged three Russian-German nationals for acting as secret service agents…
The first night of New Year brought in a terrifying moment for me that many professionals fear in the online…
Researchers have demonstrated a method to bypass Windows 11’s BitLocker encryption, enabling the extraction of Full Volume Encryption Keys (FVEKs)…
72 Hours to Audit-Ready API Security APIs present a unique challenge in this landscape, as risk assessment and mitigation are…











