In a post-Covid world all organisations have had to adapt to new ways of working. The transition to remote working…
The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer malware, and its new variant was being marketed in…
Dec 01, 2023NewsroomMalware / Cyber Espionage A suspected Chinese-speaking threat actor has been attributed to a malicious campaign that targets…
Almost 60% of workers in the UK have had no training in digital skills, according to research by CV Genius….
Zyxel has patched six vulnerabilities affecting its network attached storage (NAS) devices, including several (OS) command injection flaws that can…
Dec 01, 2023The Hacker NewsMalware / Cyber Threat The U.S. Department of Justice (DOJ) and the FBI recently collaborated in…
CISA adds ownCloud and Google Chrome bugs to its Known Exploited Vulnerabilities catalog Pierluigi Paganini December 01, 2023 US CISA…
Black Basta, the fourth-most active ransomware strain with more than 329 victims, has reportedly made over $100 million in ransom…
Today marks the day when Google makes good on its new policy to reserve the right to delete inactive accounts…
According to a recent report by Secureworks, a well-planned and advanced phishing attack was carried out, specifically targeting hotels and…
Dec 01, 2023The Hacker NewsNetwork Security / Cyber Attack The most recent Gcore Radar report and its aftermath have highlighted…
Authored by Neelesh Kripalani, Chief Technology Officer, Clover Infotech Once again, we have reached that time of the year, when…











