Hackers use phishing emails to mislead recipients into providing personal data like usernames, passwords, credit card numbers, or social security…
Water Sigbin (8220 Gang) exploits vulnerabilities (CVE-2017-3506, CVE-2023-21839) in Oracle WebLogic servers to deliver cryptocurrency miners using PowerShell scripts. They…
LNK files, a shortcut file type in Windows OS, provide easy access to programs, folders, or websites. Created automatically during…
Google has announced a new update for the Chrome browser, rolling out version 126.0.6478.114/115 for Windows and Mac and 126.0.6478.114…
Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that…
Cybersecurity researchers have identified a series of malicious software packages targeting MacOS users. These packages, found on the Python Package…
A critical vulnerability has been discovered in Fortinet's FortiOS SSL-VPN and FortiProxy SSL-VPN. The flaw, identified as FG-IR-23-225, allows attackers…
In a recent development, Zscaler Inc., a prominent cybersecurity firm, has concluded its investigation into a potential data breach initially…
In a sophisticated cyberattack campaign, hackers are using the online meeting platform GoToMeeting to distribute a Remote Access Trojan known…
Google released a critical security update for its Chrome web browser to address attackers exploiting a high-severity vulnerability. The update…