BlackBerry reported a new iOS LightSpy malware, but Huntress researchers found it to be a macOS variant targeting Intel or…
A large botnet-as-a-service network originating from China was discovered, which comprises numerous domains, over 20 active Telegram groups, and utilizes…
Hackers often focus on flaws in Microsoft products since they are commonly employed in various institutions and personal computers, which…
A SIM Swap Scam or SIM Cloning Scam exploits a vulnerability in a two-factor authentication (2FA) system that relies on…
CrushFTP is a file transfer server that supports secure protocols, offers easier configuration, and offers powerful monitoring tools. It also…
A new banker, SoumniBot, has recently been identified. It targets Korean users and is incredible by using an unusual method…
Hackers use brute-force attacks since it is an uncomplicated technique to break passwords or get into systems without permission. By…
In a recent cybersecurity revelation, Ivanti, a leading provider of enterprise-grade secure access solutions, has been found to have significant…
Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by…
Threat actors use stealers to collect sensitive information from unsuspecting users covertly. These tools are favored for their ability to…