India Post SMS Phishing Targets Mobile Users in India
Massive complaints come from Indian users regarding a new wave of SMS phishing scams, particularly targeting iPhones. They mimic delivery notification messages from India Post, one of the major postal…
Docker Engine Authentication Bypass Vulnerability Exploited
Attackers are actively exploiting a critical vulnerability in the Docker Engine that may allow for authentication bypass in a chain attack. This vulnerability allows attackers to bypass AuthZ authorization plugins,…
Hamster Kombat Players Targeted in a New Malware Spreading Scheme
Players of Hamster Kombat have become prime targets for scammers promoting phishing schemes aimed at those looking for easy earnings. Malicious actors steal confidential data and infect inattentive players with…
New Telegram Scam Mimics Digital Wallets, Promotes Shady Apps
A new Telegram scam has emerged, leveraging bots functionality of the application and offering fake earning schemes. Scammers impersonate official bots of popular digital wallet brands, tricking users into investing…
Trojan:BAT/PSRunner.VS!MSR
Trojan:BAT/PSRunner.VS!MSR is a detection of malware that executes malicious commands on a compromised system. It does not do much hurt by itself and rather serves for payload delivery & running.…
How to Stop Spam Texts?
The spam texts can include spam emails and spam calls. These are all unwanted and often annoying text messages whose sender you don’t know. The purpose of such spam is…
Jellyfish Loader Malware Discovered, Threatens 2024 Olympics
A new threat has been discovered in the form of a Windows shortcut that is actually a .NET-based shellcode downloader called Jellyfish Loader. It has some strange features that may…
How to Prevent Email Spoofing
Types of Email Spoofing Email spoofing, also known as spoofing email, involves forging the sender's email address. Often, the address in the sender's field is fake; any responses sent to…
CSRF (Cross-Site Request Forgery) vs XSS
Cross-Site Request Forgery Cross-Site Request Forgery (CSRF) is an attack targeting vulnerabilities in computer security, posing significant risks to user information and accounts. It manipulates the web browser to perform…
ARP Spoofing Attacks: The Silent Network Threat You Need to Know in 2025
ARP spoofing attacks (also known as ARP cache poisoning) remain one of the most effective yet understated network security threats in 2025. These attacks allow cybercriminals to intercept sensitive data,…
Phishing vs Spoofing: Definition & Differences
What is a Phishing Attack? Phishing is a cyber-attack method that introduces malware to a computer via email. Intruders send users emails containing links under various pretexts. After clicking these…
CrowdStrike Falcon Bug Causes Windows Outages Around the Globe
Bug in the recent update of the CrowdStrike Falcon caused thousands of systems across the world to crash with BSOD. The worst part about it is that Windows refuses to…
