SugarGh0st RAT Delivered via Malicious Windows & JavaScript
Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim’s computer remotely. RATs allow threat...
Read more →Hackers use Remote Access Trojans (RATs) to gain unauthorized access and control over a victim’s computer remotely. RATs allow threat...
Read more →Attackers are exploiting three critical vulnerabilities in internet-facing Qlik Sense instances to deliver Cactus ransomware to target organizations, Arctic Wolf...
Read more →Dec 01, 2023NewsroomPrivacy / Data Protection Meta-owned WhatsApp has launched a new Secret Code feature to help users protect sensitive...
Read more →In a post-Covid world all organisations have had to adapt to new ways of working. The transition to remote working...
Read more →The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in...
Read more →Dec 01, 2023NewsroomMalware / Cyber Espionage A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets...
Read more →Almost 60% of workers in the UK have had no training in digital skills, according to research by CV Genius....
Read more →Zyxel has patched six vulnerabilities affecting its network attached storage (NAS) devices, including several (OS) command injection flaws that can...
Read more →Dec 01, 2023The Hacker NewsMalware / Cyber Threat The U.S. Department of Justice (DOJ) and the FBI recently collaborated in...
Read more →CISA adds ownCloud and Google Chrome bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 01, 2023 US CISA...
Read more →Black Basta, the fourth-most active ransomware strain with more than 329 victims, has reportedly made over $100 million in ransom...
Read more →Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts...
Read more →