Hackers Install macOS Malware Via Weaponised Calendar Invites
Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading...
Read more →Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading...
Read more →Mar 06, 2024NewsroomPrivacy / Spyware The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and...
Read more →The Post Office’s decision to prosecute subpostmasters using Horizon evidence during the software’s early roll-out phase was “frightening”, according to...
Read more →A hacker operating on the dark web has asserted possession of data from prestigious educational institutions in the United States....
Read more →Malware can use the Notepad service to attack systems such as Windows and Linux since Notepad is a widely used...
Read more →A threat actor has been identified as creating fraudulent Skype, Google Meet, and Zoom websites to distribute malware, explicitly targeting...
Read more →The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “TheGhostSec and...
Read more →Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding...
Read more →Shortly after millions of Facebook and Instagram users encountered difficulties accessing their accounts, speculation quickly arose that a state-funded cyberattack...
Read more →Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative...
Read more →Threat actors have been discovered to be using a new technique for deploying the CHAVECLOAK banking trojan to target users...
Read more →Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell....
Read more →