Wazawaka Hacker Arrested in Kaliningrad, Russia
Russian authorities have arrested the infamous hacker Mikhail Pavlovich Matveev, widely known…
Bootkitty Bootkit Discovered in the Wild, Targeting Linux
Cybersecurity researchers have reported the creation of a first-of-its-kind UEFI bootkit for…
Corrupted Word Documents Phishing Attacks Avoid Security Checks
Hackers found a new way of bypassing the email security filters and…
Skyjem.com
Skyjem.com is a questionable search engine that you may see appearing in…
Ledger Recovery Phrase Verification Scam
“Ledger Recovery Phrase Verification” is a scam email that targets non-vigilant users.…
Trojan:PDF/Phish.A
Trojan:PDF/Phish.A is detection of a PDF file which potentially carries a malicious…
CISA Urges to Patch Critical Array Networks Vulnerabilities
The US cybersecurity agency CISA warned about the ongoing exploitation of a…
Meta Deletes 2 Million Accounts Related to Scams
Meta has intensified its fight against pig butchering scams, removing over 2…
Trojan:PowerShell/Malscript!MSR
Trojan:PowerShell/Malscript!MSR refers to a detection linked to malicious script activity. This type…
NodeStealer Returns With Python Codebase, More Functions
Researchers have identified an updated version of NodeStealer, now rewritten in Python.…
TrojanDownloader:HTML/Elshutilo
TrojanDownloader:HTML/Elshutilo is script-based malware designed to download additional payloads onto the target…
Meta Security Email Phishing Scams Explained
Attackers are targeting users of Meta services with phishing attacks. Classic fraud…