The Second Exploit in Ivanti EPMM in a Week
Ivanti has once again encountered an error that affects and corrects its…
Predasus Malware Attacks Latin America Through Browser Plugins
Latin America has been hit by cyberattacks using malicious Google Chrome extensions.…
Infostealers: How to Detect, Remove and Prevent them?
The flow of information is crucial in today's world, but it's also…
FraudGPT Offers Phishing Email Generation to Cybercriminals
It's not just IT companies racing to develop AI-powered chatbots. Cybercriminals have…
Information Security Threats in Social Media
Social media has become an important aspect of our everyday lives in…
Ivanti 0-day exploited to target Norwegian government
Software development company Ivanti (formerly MobileIron Core) has patched a zero-day vulnerability…
Gozi and IcedID Trojans Spread via Malvertising
Malvertising on Google Search is an unpleasant occurrence where malicious ads appear…
Trojanized TeamViewer Installer Spreads njRAT
Threat actors reportedly started using fake TeamViewer to distribute malware. Their particular…
US Military Emails Leaked Massively Due to the Typo
Email letters sent to the US military addresses ended up on similarly-named…
Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing
In June, researchers revealed a vulnerability in Azure Active Directory and third-party…
American Airlines Hacked by Cl0P Gang, MOVEit Involved
American Airlines, the major airline company in the US, appears to be…
What is Cyber Risk Exposure and How Can You Manage It?
Modern businesses face cybersecurity threats daily. While most are effectively neutralized, a…