Trojanized TeamViewer Installer Spreads njRAT
Threat actors reportedly started using fake TeamViewer to distribute malware. Their particular…
US Military Emails Leaked Massively Due to the Typo
Email letters sent to the US military addresses ended up on similarly-named…
Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing
In June, researchers revealed a vulnerability in Azure Active Directory and third-party…
American Airlines Hacked by Cl0P Gang, MOVEit Involved
American Airlines, the major airline company in the US, appears to be…
Trojan:Win32/Randet.A!plock – What is That Detection?
Windows Defender's mass detections of Trojan:Win32/Randet.A!plock worries people. Are the user files…
Microsoft CVE-2023-36884 Vulnerability Exploited in the Wild
On July 11, 2023, Microsoft published an article about addressing the CVE-2023-36884…
What is Cyber Risk Exposure and How Can You Manage It?
Modern businesses face cybersecurity threats daily. While most are effectively neutralized, a…
Hot and Cold Crypto Wallets Hacking
Cryptocurrency is a rapidly changing world where people can make fortunes by…
Forged Driver Signatures Exploited In The Wild
Hackers actively use driver signature spoofing, which originates from a loophole in…
Legion Stealer targeting PUBG players
Scammers are using a misleading GitHub page to distribute Legion Stealer to…
Bed Bath & Beyond Shopping Scams
In late April, 2023, American home goods retailer Bed Bath & Beyond…
Barts NHS Trust Hacked by BlackCat/ALPHV Ransomware Group
A Russian cybercriminal gang BlackCat claims to have hacked into one of…