Technology

Targeted cryptographic developers for Python malware spoofing coding challenges

North Korea-related threat actors, rated as behind the massive Buybit Hack in…

5 Min Read

Windows 0-Day, VPN exploits, weaponized AI, hijacked antivirus, etc.

The attacker is no longer waiting for the patch. They are invading…

24 Min Read

Phishing campaigns use real-time checks to validate victim emails before credential theft

Cybersecurity researchers are bringing attention to a new type of qualification phishing…

4 Min Read

The Resolverrat Campaign is targeted at healthcare and pharmaceutical companies via phishing and DLL sideloads

Cybersecurity researchers have discovered a new, sophisticated remote access trojan called Resolverrat,…

4 Min Read

Pakistan-linked hackers expand Indian targets with curlback rats and spark rats

It has been observed that threat actors with ties to Pakistan are…

4 Min Read

Microsoft Patch 125 Flaws including vulnerabilities in Windows CLFS that were actively utilized

Microsoft has released security fixes to address a large set of 125…

5 Min Read

CISA warns of RCE attacks enabling hard-coded MachineKey vulnerabilities in Centrestack

The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a…

2 Min Read

Amazon’s Alexa+: A new era of AI-powered personal assistants

AI-powered personal assistants become essential to a fast-paced life, managing tasks, controlling…

10 Min Read

Pipemagic Trojan leverages Windows Zero-Day vulnerabilities to deploy ransomware

Microsoft has revealed that a currently patched security flaw affecting Windows Common…

3 Min Read