GhostSec & Stormous Launched Twin Ransomware Attacks
A hacking group has evolved with a new ransomware variant known as GhostLocker 2.0. This group, in collaboration with the Stormous ransomware operators, has initiated…
A hacking group has evolved with a new ransomware variant known as GhostLocker 2.0. This group, in collaboration with the Stormous ransomware operators, has initiated…
Hackers use weaponized calendar invites to exploit vulnerabilities in email systems, tricking users into clicking on malicious links or downloading malware disguised as event attachments. …
Mar 06, 2024NewsroomPrivacy / Spyware The U.S. Department of Treasury’s Office of Foreign Assets Control (OFAC) sanctioned two individuals and five entities associated with the…
The Post Office’s decision to prosecute subpostmasters using Horizon evidence during the software’s early roll-out phase was “frightening”, according to an IT expert who exposed…
A hacker operating on the dark web has asserted possession of data from prestigious educational institutions in the United States. Among the institutions mentioned are…
Malware can use the Notepad service to attack systems such as Windows and Linux since Notepad is a widely used application on most operating systems.…
A threat actor has been identified as creating fraudulent Skype, Google Meet, and Zoom websites to distribute malware, explicitly targeting Android and Windows users. This…
The cybercrime group called GhostSec has been linked to a Golang variant of a ransomware family called GhostLocker. “TheGhostSec and Stormous ransomware groups are jointly…
Hackers launch large-scale DDoS attacks to disrupt and make online services inaccessible, driven by motives like revenge or protest, flooding targets with massive amounts of…
Shortly after millions of Facebook and Instagram users encountered difficulties accessing their accounts, speculation quickly arose that a state-funded cyberattack might be to blame. Mark…
Data loss from insiders continues to pose a growing threat to security, with emerging technologies such as AI and generative AI (GenAI) only compounding the…
Threat actors have been discovered to be using a new technique for deploying the CHAVECLOAK banking trojan to target users in Brazil. This trojan is…