DLL Search Order Hijacking Technique Bypasses Protection
A new DLL (Dynamic Link Library) Search Order Hijacking variant emerged. This…
Microsoft Disables MSIX App Installer Protocol
Microsoft reportedly disabled MSIX installer protocol in Windows, due to its exploitation…
PUABundler:Win32/PiriformBundler
PUABundler:Win32/PiriformBundler is the detection of an unwanted program, developed and issued by…
Novice Rugmi Loader Delivers Various Spyware
The threat landscape meets a new player - Rugmi Loader. This threat…
Xamalicious Trojan Hits Over 327K Android Devices
A new Android backdoor, dubbed Xamalicious, was discovered by the researchers at…
Integris Health Hacked, Patients Receive Ransom Emails
Integris Health, Oklahoma's most extensive not-for-profit health network, fell victim to a…
Carbanak is Back with a New Spreading Tactic
The Carbanak cybercrime group, infamous for its banking malware, has resurfaced with…
What Should You Do When You Get Scammed?
As online scams become not only more widespread, but also more sophisticated,…
What are Crypto Draining Attacks? Signs & Mitigation
Among a wide variety of possible scams that involve cryptocurrencies, crypto draining…
UAC-0099 Targets Ukrainian Companies With Lonepage Malware
Ukrainian cyberwarfare sees further action as the UAC-0099 threat actor escalates its…
FalseFont Malware Targets Defence Contractors Worldwide
The Iranian hacking group APT33 has developed a new malware called FalseFont.…
Cryptocurrency Scams on Twitter Exploit Post Features
Fraudsters are seen to exploit a feature of Twitter publications, misleading users…