HiatusRAT Used in Attacks on Taiwan Companies and U.S. Military
Recent attacks on US military systems and Taiwan companies are distinctive not…
Phishing With Hacked Sites Becomes a Massive Menace
Threat actors started using compromised websites for phishing purposes much more frequently.…
Back to School Scams Expand As August Begins
As the new school season approaches, scammers target students and their parents.…
Ivanti EPMM Vulnerability Patch is Vulnerable
Ivanti, the provider of a wide range of management solutions for corporations,…
Are .zip Domains Safe to Use and Visit?
The Internet has become our second home. Every time we surf the…
Twitter Blue to X Phishing Breakout
Amid the chaos of Twitter's transition to the new name – X,…
Bahamut APT Targets Users With Fake SafeChat App
Attackers are using a fake SafeChat Android app to attack users in…
The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and corrects its…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google Chrome extensions.…
Infostealers: How to Detect, Remove and Prevent Information-Stealing Malware in 2025
Information is one of our most valuable assets in today's digital world,…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called…
Decoy Dog Malware Uncovered: Next-Gen Spyware
A group of hackers, presumably state-sponsored, is actively developing and beginning to…