Targeted cryptographic developers for Python malware spoofing coding challenges
North Korea-related threat actors, rated as behind the massive Buybit Hack in…
5 Min Read
Windows 0-Day, VPN exploits, weaponized AI, hijacked antivirus, etc.
The attacker is no longer waiting for the patch. They are invading…
24 Min Read
Phishing campaigns use real-time checks to validate victim emails before credential theft
Cybersecurity researchers are bringing attention to a new type of qualification phishing…
4 Min Read
The Resolverrat Campaign is targeted at healthcare and pharmaceutical companies via phishing and DLL sideloads
Cybersecurity researchers have discovered a new, sophisticated remote access trojan called Resolverrat,…
4 Min Read
Pakistan-linked hackers expand Indian targets with curlback rats and spark rats
It has been observed that threat actors with ties to Pakistan are…
4 Min Read
Microsoft Patch 125 Flaws including vulnerabilities in Windows CLFS that were actively utilized
Microsoft has released security fixes to address a large set of 125…
5 Min Read
CISA warns of RCE attacks enabling hard-coded MachineKey vulnerabilities in Centrestack
The US Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday added a…
2 Min Read
Amazon’s Alexa+: A new era of AI-powered personal assistants
AI-powered personal assistants become essential to a fast-paced life, managing tasks, controlling…
10 Min Read
Pipemagic Trojan leverages Windows Zero-Day vulnerabilities to deploy ransomware
Microsoft has revealed that a currently patched security flaw affecting Windows Common…
3 Min Read