What is Cyber Risk Exposure and How Can You Manage It?
Modern businesses face cybersecurity threats daily. While most are effectively neutralized, a…
Hot and Cold Crypto Wallets Hacking
Cryptocurrency is a rapidly changing world where people can make fortunes by…
Forged Driver Signatures Exploited In The Wild
Hackers actively use driver signature spoofing, which originates from a loophole in…
Legion Stealer targeting PUBG players
Scammers are using a misleading GitHub page to distribute Legion Stealer to…
Bed Bath & Beyond Shopping Scams
In late April, 2023, American home goods retailer Bed Bath & Beyond…
Barts NHS Trust Hacked by BlackCat/ALPHV Ransomware Group
A Russian cybercriminal gang BlackCat claims to have hacked into one of…
Proxyjacking: The Latest Cybercriminal Invention In Action
Today, in the constantly changing world of cyber threats, attackers always look…
PlugX malware attacks European diplomats
Over the past few months, researchers have been monitoring the activity of…
Akira Ransomware Decryptor Is Available To The Public
Cybersecurity experts have released a decryptor for the Akira ransomware. It will…
RedEnergy Stealer-as-a-Ransomware On The Rise
Researchers have discovered a new form of malware called RedEnergy Stealer. It…
BlackCat Ransomware Employs Malvertising In Targeted Attacks
Recently malicious actors started using malvertising to spread BlackCat ransomware. They use…
Super Mario Malware: Hackers Spread Stealers in the Fake Game
The Super Mario video game franchise has gained immense acclaim due to…