Candiru Malware Uses 0-day Vulnerability In Chrome
Following Microsoft, Google and Citizen Lab, another revelation came from Avast researchers. They discovered that the Israeli spyware Candiru used a 0-day vulnerability in Google Chrome. Their main target was…
Spam Phone Calls Revenge: Prevent Spam Risk Phone Calls
Statistics show that an average of 1,900 spam calls are made every second. Given recent statistics about it, it is clear that it is another problem in the head of…
Fraudsters Are Running a Malicious Advertising Campaign through Google Search
Malwarebytes, an information security company, has discovered a large malicious campaign that skillfully uses ads and Google search. A phishing campaign using Windows tech support is spreading through Google Ads.…
Fake DDoS App Targets Pro-Ukrainian Hacktivists
Google Threat Analysis Group (TAG) specialists reported that the Russian-speaking group Turla (aka Waterbug and Venomous Bear) created a fake Android application, allegedly designed to carry out DDoS attacks and…
CloudMensis Malware Attacks MacOS Users
ESET experts have discovered the CloudMensis malware, which is used to create backdoors on devices running macOS and subsequently steal information. The malware received its name due to the fact…
“Your Account Has Been Locked”: Top 5 Signs of a Phishing Scam
The topic of our article will be how to understand that you have become a victim of a phishing attack. Below, you will learn what is discussed in our main…
Cybersecurity Researchers Discovered a New Phishing Kit targeting PayPal Users
Akamai has identified a new phishing kit that is being installed on hacked WordPress sites and targets PayPal users. The malware tries to steal the personal information of the victims,…
Microsoft Releases PoC Exploit to Escape MacOS Sandbox
Microsoft has detailed a recently patched vulnerability affecting Apple operating systems and published a PoC exploit to escape the macOS sandbox. If successfully exploited, this bug allows to leavei the…
5 Security Mistakes You’re Making On Social Media
Leading digital life on various social media platforms can sometimes be a challenging task. And the challenges come not only from the efforts of maintaining presentable digital selves. It is…
DDoS Attacks: 6 Tried-and-Tested Methods How to Prevent It
DDoS Attacks: 6 Tried-and-Tested Methods How to Prevent It Before considering how to prevent DDoS attacks, we first consider this definition. Because without understanding what is at stake, it will…
100% Disk Usage Windows 10: How to Fix Disk Issue
100% disk usage is a widespread problem among Windows users that has several possible origins. Having your disk 100% loaded is unhealthy and leads to PC usage problems. Let’s figure…
U2K Ransomware Strikes, Thousands Of Victims
U2K ransomware, probably the rising star on the ransomware arena, appeared on July 10, 2022. It instantly infected a huge number of users and keeps spreading, despite the massive alarms…