North Korean Hackers Force US, Japan & South Korea Consultations
Increased activity by North Korean state hackers forced South Korea, the United…
Socks5Systemz Proxy Service Infects 10,000 Systems Worldwide
A proxy botnet, "Socks5Systemz", uses malware loaders to infiltrate computers across the…
Malicious WhatsApp Mods Spread Through Telegram
Some WhatsApp mods, which are unofficial versions of the app, have been…
New F5 BIG-IP Vulnerabilities Exploited In The Wild
Two new vulnerabilities in F5 BIG-IP reportedly allow for remote code execution…
WeChat and Kaspersky Ban in Canada – What You Should Know?
The Canadian government has instituted a ban on the use of WeChat…
Octo Tempest Threat Actor – The Most Dangerous Cybercrime Gang?
Octo Tempest, a financially-motivated hacking group, has been labeled "one of the…
IoT Malware Attacks Grow by 400% in 2023
IoT malware has been a major concern over the last decade. However,…
What is Android:TrojanSMS-PA detection?
Android:TrojanSMS-PA is a detection name from a built-in Huawei security tool. This…
VMware Releases Patch for Critical vCenter Server RCE Vulnerability
VMware has released a patch for a critical vulnerability in the vCenter…
1Password Hacked Following the Okta Hack
Recent security breach in the 2FA provider Okta appears to affect some…
Skype & Microsoft Teams Spam Spreads DarkGate Loader
Over the past few years, DarkGate has been relatively inactive. However, several…
Fake Amazon and Microsoft Tech Support call centers busted
Amazon and Microsoft are partnering with CBI to crack down on multiple…