Twitter Blue to X Phishing Breakout
Amid the chaos of Twitter's transition to the new name – X, scammers have devised yet another deception scheme. They offer Twitter Blue users to transfer their subscriptions to X,…
Bahamut APT Targets Users With Fake SafeChat App
Attackers are using a fake SafeChat Android app to attack users in the South Asian region. The malware is designed to steal call logs, text messages, and GPS locations from…
Conti Members Are Back in Action as Part of Akira Ransomware
Experts are intestigating activity of the ransomware group Akira, which has compromised at least 63 organizations since March 2023, mostly targeting small and medium-sized businesses. Analysts at Arctic Wolf believe…
The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and corrects its Endpoint Manager software. This is despite the fact that Ivanti had eliminated a zero-day vulnerability that targeted the…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google Chrome extensions. Attackers targeted financial institutions, booking sites, and instant messaging. Malware used in this attacks was dubbed Predasus. Predasus…
Infostealers: How to Detect, Remove and Prevent them?
The flow of information is crucial in today's world, but it's also precious to cybercriminals. They target personal data stored on your device through infostealer malware, putting your information at…
GameOver(lay) Vulnerabilities Endanger 40% of Ubuntu Users
Cloud security researchers have discovered two easily exploitable privilege escalation vulnerabilities called GameOver(lay) in the Ubuntu OverlayFS module. These vulnerabilities could affect 40% of Ubuntu users. What is OverlayFS? OverlayFS…
Google Is Working on an Information Security Project Called Web Integrity API
A team of four Google engineers is working on a new project called the Web Environment Integrity API, which will allow sites to block client applications that change their code.…
Decoy Dog Malware Uncovered: Next-Gen Spyware
A group of hackers, presumably state-sponsored, is actively developing and beginning to use a sophisticated Decoy Dog toolkit. It has likely been used for over a year in cyber intelligence…
FraudGPT Offers Phishing Email Generation to Cybercriminals
It's not just IT companies racing to develop AI-powered chatbots. Cybercriminals have also joined the fray. Recent reports indicate that a developer has built a dangerous AI chatbot called "FraudGPT"…
Google Creates a Red Team to Attack AI Systems
Google says it is creating a red team that will specialize in "sophisticated technical attacks on AI systems." Among examples of such attacks, the company's report lists prompt engineering, extracting…
Information Security Threats in Social Media
Social media has become an important aspect of our everyday lives in this age of technology and information. Despite its numerous advantages, social media has raised concerns about protecting personal…