Are .zip Domains Safe to Use and Visit?
The Internet has become our second home. Every time we surf the…
Twitter Blue to X Phishing Breakout
Amid the chaos of Twitter's transition to the new name – X,…
Bahamut APT Targets Users With Fake SafeChat App
Attackers are using a fake SafeChat Android app to attack users in…
The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and corrects its…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google Chrome extensions.…
Infostealers: How to Detect, Remove and Prevent them?
The flow of information is crucial in today's world, but it's also…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called…
Decoy Dog Malware Uncovered: Next-Gen Spyware
A group of hackers, presumably state-sponsored, is actively developing and beginning to…
FraudGPT Offers Phishing Email Generation to Cybercriminals
It's not just IT companies racing to develop AI-powered chatbots. Cybercriminals have…
Information Security Threats in Social Media
Social media has become an important aspect of our everyday lives in…
Ivanti 0-day exploited to target Norwegian government
Software development company Ivanti (formerly MobileIron Core) has patched a zero-day vulnerability…
Luca Stealer Spreads Via a Phishing Microsoft Crypto Wallet Site
With the ever-increasing number of cyber threats, hackers and cybersecurity specialists are…