A hacker operating on the dark web has asserted possession of data from prestigious educational institutions in the United States….
Malware can use the Notepad service to attack systems such as Windows and Linux since Notepad is a widely used…
A threat actor has been identified as creating fraudulent Skype, Google Meet, and Zoom websites to distribute malware, explicitly targeting…
The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “TheGhostSec and…
Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding…
Shortly after millions of Facebook and Instagram users encountered difficulties accessing their accounts, speculation quickly arose that a state-funded cyberattack…
Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative…
Threat actors have been discovered to be using a new technique for deploying the CHAVECLOAK banking trojan to target users…
Hackers have been found exploiting a vulnerability in a WordPress Plugin 3DPrint Lite(CVE-2021-4436) to deploy the notorious Godzilla Web Shell….
In today’s interconnected world, maintaining a pristine digital reputation is paramount. Whether you’re an individual, a business, or an organization,…
API integrations often handle sensitive data, such as employees’ personally identifiable information (PII), companies’ financial information, or even clients’ payment…
Mar 06, 2024NewsroomVulnerability / Zero Day Apple has released security updates to address several security flaws, including two vulnerabilities that…











