Cyberattacks on Educational Institutions
06
Mar
2024

US Educational Institutions Targeted In Alleged Data Breach

A hacker operating on the dark web has asserted possession of data from prestigious educational institutions in the United States….

WogRAT Malware Exploits Notepad Service To Attack Windows & Linux Systems
06
Mar
2024

WogRAT Malware Exploits Notepad Service To Attack Windows & Linux Systems

Malware can use the Notepad service to attack systems such as Windows and Linux since Notepad is a widely used…

WordPress Plugin Godzilla
06
Mar
2024

Hackers use Zoom & Google Meet Lures to Attack Android & Windows

A threat actor has been identified as creating fraudulent Skype, Google Meet, and Zoom websites to distribute malware, explicitly targeting…

GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries
06
Mar
2024

GhostSec and Stormous Launch Joint Ransomware Attacks in Over 15 Countries

The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “TheGhostSec and…

WordPress Plugin Godzilla
06
Mar
2024

Project DDoSia – Russian Hackers Planning Massive DDoS Attack

Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding…

Headlines Trending on Google Regarding Recent Cyber Attacks
06
Mar
2024

Facebook and Instagram down by Cyber Attack

Shortly after millions of Facebook and Instagram users encountered difficulties accessing their accounts, speculation quickly arose that a state-funded cyberattack…

AI tools put companies at risk of data exfiltration
06
Mar
2024

AI tools put companies at risk of data exfiltration

Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative…

New CHAVECLOAK Malware Hack Windows Via PDF File
06
Mar
2024

New CHAVECLOAK Malware Hack Windows Via PDF File

Threat actors have been discovered to be using a new technique for deploying the CHAVECLOAK banking trojan to target users…

Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla
06
Mar
2024

Hackers Exploit WordPress Plugin Flaw to Deploy Godzilla

Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell….

Difference between Whale Phishing and Spear Phishing
06
Mar
2024

Safeguarding Your Digital Reputation: Best Practices for Secure Data Erasure

In today’s interconnected world, maintaining a pristine digital reputation is paramount. Whether you’re an individual, a business, or an organization,…

5 ways to keep API integrations secure
06
Mar
2024

5 ways to keep API integrations secure

API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ financial information, or even clients’ payment…

Zero-Day Flaws
06
Mar
2024

Apple Issues Critical Updates for Actively Exploited Zero-Day Flaws

Mar 06, 2024NewsroomVulnerability / Zero Day Apple has released security updates to address several security flaws, including two vulnerabilities that…