Eriakos Scam in Facebook Ads Targets Personal and Banking Data
Fraudsters are using fake websites and Facebook Ads to steal users' financial…
BangBros Leak Exposes 12 Million User Records
BangBros, a studio and platform specializing in adult content, leaked information about…
PUABundler:Win32/YandexBundled
PUABundler:Win32/YandexBundled is a detection of potentially unwanted application (PUA) associated with the…
Fake Google Authenticator Abuses Google Ads, Spreads Malware
Cybercriminals promote a fake Google Authenticator page through ads in Google Search.…
Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page
Attackers are using a new loader, Gh0stGambit, to spread Gh0st RAT malware…
2024 Olympic Cyberattack Risks: What Should We Expect
The Olympic Games is a massive sporting event that attracts billions of…
India Post SMS Phishing Targets Mobile Users in India
Massive complaints come from Indian users regarding a new wave of SMS…
Docker Engine Authentication Bypass Vulnerability Exploited
Attackers are actively exploiting a critical vulnerability in the Docker Engine that…
Hamster Kombat Players Targeted in a New Malware Spreading Scheme
Players of Hamster Kombat have become prime targets for scammers promoting phishing…
New Telegram Scam Mimics Digital Wallets, Promotes Shady Apps
A new Telegram scam has emerged, leveraging bots functionality of the application…
Trojan:BAT/PSRunner.VS!MSR
Trojan:BAT/PSRunner.VS!MSR is a detection of malware that executes malicious commands on a…
How to Stop Spam Texts?
The spam texts can include spam emails and spam calls. These are…