Tag: Cybersecurity

Infostealers: How to Detect, Remove and Prevent them?

The flow of information is crucial in today's world, but it's also…

Stephanie Adlam

FraudGPT Offers Phishing Email Generation to Cybercriminals

It's not just IT companies racing to develop AI-powered chatbots. Cybercriminals have…

Stephanie Adlam

Information Security Threats in Social Media

Social media has become an important aspect of our everyday lives in…

Stephanie Adlam

Ivanti 0-day exploited to target Norwegian government

Software development company Ivanti (formerly MobileIron Core) has patched a zero-day vulnerability…

Stephanie Adlam

Gozi and IcedID Trojans Spread via Malvertising

Malvertising on Google Search is an unpleasant occurrence where malicious ads appear…

Stephanie Adlam

Trojanized TeamViewer Installer Spreads njRAT

Threat actors reportedly started using fake TeamViewer to distribute malware. Their particular…

Stephanie Adlam

US Military Emails Leaked Massively Due to the Typo

Email letters sent to the US military addresses ended up on similarly-named…

Stephanie Adlam

Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing

In June, researchers revealed a vulnerability in Azure Active Directory and third-party…

Stephanie Adlam

American Airlines Hacked by Cl0P Gang, MOVEit Involved

American Airlines, the major airline company in the US, appears to be…

Stephanie Adlam

What is Cyber Risk Exposure and How Can You Manage It?

Modern businesses face cybersecurity threats daily. While most are effectively neutralized, a…

Stephanie Adlam

Forged Driver Signatures Exploited In The Wild

Hackers actively use driver signature spoofing, which originates from a loophole in…

Stephanie Adlam

Legion Stealer targeting PUBG players

Scammers are using a misleading GitHub page to distribute Legion Stealer to…

Stephanie Adlam