Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing
In June, researchers revealed a vulnerability in Azure Active Directory and third-party…
American Airlines Hacked by Cl0P Gang, MOVEit Involved
American Airlines, the major airline company in the US, appears to be…
Trojan:Win32/Randet.A!plock – What is That Detection?
Windows Defender's mass detections of Trojan:Win32/Randet.A!plock worries people. Are the user files…
Microsoft CVE-2023-36884 Vulnerability Exploited in the Wild
On July 11, 2023, Microsoft published an article about addressing the CVE-2023-36884…
What is Cyber Risk Exposure and How Can You Manage It?
Modern businesses face cybersecurity threats daily. While most are effectively neutralized, a…
Hot and Cold Crypto Wallets Hacking
Cryptocurrency is a rapidly changing world where people can make fortunes by…
Forged Driver Signatures Exploited In The Wild
Hackers actively use driver signature spoofing, which originates from a loophole in…
Legion Stealer targeting PUBG players
Scammers are using a misleading GitHub page to distribute Legion Stealer to…
Bed Bath & Beyond Shopping Scams
In late April, 2023, American home goods retailer Bed Bath & Beyond…
Barts NHS Trust Hacked by BlackCat/ALPHV Ransomware Group
A Russian cybercriminal gang BlackCat claims to have hacked into one of…
Proxyjacking: The Latest Cybercriminal Invention In Action
Today, in the constantly changing world of cyber threats, attackers always look…
PlugX malware attacks European diplomats
Over the past few months, researchers have been monitoring the activity of…