Wilko Stock Liquidation Scams – Fake Shopping Sites
Recent events around the Wilko retail chain are sad for its customers,…
Botnet of 400,000 Devices Used as Proxy Nodes Uncovered
Cybercriminals used stealthy malware to create a botnet of 400,000 proxy servers.…
HiatusRAT Used in Attacks on Taiwan Companies and U.S. Military
Recent attacks on US military systems and Taiwan companies are distinctive not…
Phishing With Hacked Sites Becomes a Massive Menace
Threat actors started using compromised websites for phishing purposes much more frequently.…
Back to School Scams Expand As August Begins
As the new school season approaches, scammers target students and their parents.…
Ivanti EPMM Vulnerability Patch is Vulnerable
Ivanti, the provider of a wide range of management solutions for corporations,…
Are .zip Domains Safe to Use and Visit?
The Internet has become our second home. Every time we surf the…
Twitter Blue to X Phishing Breakout
Amid the chaos of Twitter's transition to the new name – X,…
Bahamut APT Targets Users With Fake SafeChat App
Attackers are using a fake SafeChat Android app to attack users in…
The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and corrects its…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google Chrome extensions.…
Infostealers: How to Detect, Remove and Prevent them?
The flow of information is crucial in today's world, but it's also…