Carbanak is Back with a New Spreading Tactic
The Carbanak cybercrime group, infamous for its banking malware, has resurfaced with…
What Should You Do When You Get Scammed?
As online scams become not only more widespread, but also more sophisticated,…
What are Crypto Draining Attacks? Signs & Mitigation
Among a wide variety of possible scams that involve cryptocurrencies, crypto draining…
UAC-0099 Targets Ukrainian Companies With Lonepage Malware
Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its…
FalseFont Malware Targets Defence Contractors Worldwide
The Iranian hacking group APT33 has developed a new malware called FalseFont.…
Cryptocurrency Scams on Twitter Exploit Post Features
Fraudsters are seen to exploit a feature of Twitter publications, misleading users…
What are Remote Encryption Attacks? Explanation & Mitigation
The digital world is seeing a surge in remote encryption attacks -…
Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users
Comcast confirms a massive security breach impacting its Xfinity division. Nearly 36…
Mr. Cooper’s Data Breach Affects Millions
Hackers have infiltrated the secure databases of Mr. Cooper, a prominent mortgage…
ALPHV Site Taken Down by the FBI
On December 19, 2023, one of the ALPHV/BlackCat ransomware sites was taken…
Kinsta Alerts About Phishing Campaign on Google Ads
Kinsta, a prominent WordPress hosting provider, has issued a warning to its…
JetBrains Vulnerability Exploited by CozyBear Hackers
JetBrain’s TeamCity servers became a target to a Russian-backed attacker CozyBear. Using…