PUABundler:Win32/PiriformBundler
PUABundler:Win32/PiriformBundler is the detection of an unwanted program, developed and issued by…
Novice Rugmi Loader Delivers Various Spyware
The threat landscape meets a new player - Rugmi Loader. This threat…
Xamalicious Trojan Hits Over 327K Android Devices
A new Android backdoor, dubbed Xamalicious, was discovered by the researchers at…
Integris Health Hacked, Patients Receive Ransom Emails
Integris Health, Oklahoma's most extensive not-for-profit health network, fell victim to a…
Carbanak is Back with a New Spreading Tactic
The Carbanak cybercrime group, infamous for its banking malware, has resurfaced with…
What Should You Do When You Get Scammed?
As online scams become not only more widespread, but also more sophisticated,…
What are Crypto Draining Attacks? Signs & Mitigation
Among a wide variety of possible scams that involve cryptocurrencies, crypto draining…
UAC-0099 Targets Ukrainian Companies With Lonepage Malware
Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its…
FalseFont Malware Targets Defence Contractors Worldwide
The Iranian hacking group APT33 has developed a new malware called FalseFont.…
Cryptocurrency Scams on Twitter Exploit Post Features
Fraudsters are seen to exploit a feature of Twitter publications, misleading users…
What are Remote Encryption Attacks? Explanation & Mitigation
The digital world is seeing a surge in remote encryption attacks -…
Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users
Comcast confirms a massive security breach impacting its Xfinity division. Nearly 36…