Trojan:Win32/Qhosts
Trojan:Win32/Qhosts is malware that provides remote access to the target system and…
Ubiquiti G4 Vulnerability Discovered, Allowing for DDoS Attacks
Researchers found a flaw in Ubiquiti G4 Wi-Fi cameras, that exposes the…
Eriakos Scam in Facebook Ads Targets Personal and Banking Data
Fraudsters are using fake websites and Facebook Ads to steal users' financial…
BangBros Leak Exposes 12 Million User Records
BangBros, a studio and platform specializing in adult content, leaked information about…
PUABundler:Win32/YandexBundled
PUABundler:Win32/YandexBundled is a detection of potentially unwanted application (PUA) associated with the…
Fake Google Authenticator Abuses Google Ads, Spreads Malware
Cybercriminals promote a fake Google Authenticator page through ads in Google Search.…
Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page
Attackers are using a new loader, Gh0stGambit, to spread Gh0st RAT malware…
2024 Olympic Cyberattack Risks: What Should We Expect
The Olympic Games is a massive sporting event that attracts billions of…
India Post SMS Phishing Targets Mobile Users in India
Massive complaints come from Indian users regarding a new wave of SMS…
Docker Engine Authentication Bypass Vulnerability Exploited
Attackers are actively exploiting a critical vulnerability in the Docker Engine that…
Hamster Kombat Players Targeted in a New Malware Spreading Scheme
Players of Hamster Kombat have become prime targets for scammers promoting phishing…
New Telegram Scam Mimics Digital Wallets, Promotes Shady Apps
A new Telegram scam has emerged, leveraging bots functionality of the application…