Exim Vulnerability Allows RCE, No Patches Available
Exim Internet Mailer, a program massively used as a basis for mailing…
Redline and Vidar Stealers Switch to Ransomware Delivery
Cybercriminals who stand behind RedLine and Vidar stealers decided to diversify their…
TikTok Flooded By Elon Musk Cryptocurrency Giveaway Scams
Recently, TikTok has been inundated with a flood of cryptocurrency giveaway scam…
GridinSoft Launches Own Online Scanner Service – Meet Online Virus Scanner
As a part of the GridinSoft team, I am proud to announce…
3AM Ransomware Backs Up LockBit In Cyberattacks
Cybersecurity researchers have discovered a new family of ransomware called 3AM. Attackers…
What Is Identity Theft & How to Protect Against It
Identity theft is a significant issue affecting millions yearly, whether through stolen…
Google Fixes Critical Vulnerability in Chrome, Exploited in the Wild
Google released an urgent security update for its Chrome browser. The patch…
Spyware in Fake Telegram Apps Infected Over 10 million Users
It is important to exercise caution when using messenger mods. There have…
Mirai variant “Pandora” infects Android TV for DDoS attacks.
A new variant of the Mirai malware botnet has been detected, infecting…
W3LL Targets Microsoft 365 Accounts with Sophisticated Phishing Kit
In the ever-evolving landscape of cyber threats, crooks continually find new and…
NCA and DoJ Introduce New Sanctions Against Conti/Trickbot Hackers
On September 7, 2023, NCA released a statement regarding the new complex…
Can Zero-Day Attacks Be Prevented With Patches?
In recent years, zero-day exploits and attacks have become prominent emerging threats.…