Gozi and IcedID Trojans Spread via Malvertising
Malvertising on Google Search is an unpleasant occurrence where malicious ads appear…
Trojanized TeamViewer Installer Spreads njRAT
Threat actors reportedly started using fake TeamViewer to distribute malware. Their particular…
US Military Emails Leaked Massively Due to the Typo
Email letters sent to the US military addresses ended up on similarly-named…
Microsoft “nOAuth” is Vulnerable to Simple Email Spoofing
In June, researchers revealed a vulnerability in Azure Active Directory and third-party…
American Airlines Hacked by Cl0P Gang, MOVEit Involved
American Airlines, the major airline company in the US, appears to be…
What is Cyber Risk Exposure and How Can You Manage It?
Modern businesses face cybersecurity threats daily. While most are effectively neutralized, a…
Forged Driver Signatures Exploited In The Wild
Hackers actively use driver signature spoofing, which originates from a loophole in…
Legion Stealer targeting PUBG players
Scammers are using a misleading GitHub page to distribute Legion Stealer to…
Bed Bath & Beyond Shopping Scams
In late April, 2023, American home goods retailer Bed Bath & Beyond…
Proxyjacking: The Latest Cybercriminal Invention In Action
Today, in the constantly changing world of cyber threats, attackers always look…
Akira Ransomware Decryptor Is Available To The Public
Cybersecurity experts have released a decryptor for the Akira ransomware. It will…
Super Mario Malware: Hackers Spread Stealers in the Fake Game
The Super Mario video game franchise has gained immense acclaim due to…