Ubiquiti G4 Vulnerability Discovered, Allowing for DDoS Attacks
Researchers found a flaw in Ubiquiti G4 Wi-Fi cameras, that exposes the…
Eriakos Scam in Facebook Ads Targets Personal and Banking Data
Fraudsters are using fake websites and Facebook Ads to steal users' financial…
BangBros Leak Exposes 12 Million User Records
BangBros, a studio and platform specializing in adult content, leaked information about…
Fake Google Authenticator Abuses Google Ads, Spreads Malware
Cybercriminals promote a fake Google Authenticator page through ads in Google Search.…
Gh0st RAT Malware Attacks Chinese Users Via Fake Chrome Page
Attackers are using a new loader, Gh0stGambit, to spread Gh0st RAT malware…
2024 Olympic Cyberattack Risks: What Should We Expect
The Olympic Games is a massive sporting event that attracts billions of…
India Post SMS Phishing Targets Mobile Users in India
Massive complaints come from Indian users regarding a new wave of SMS…
Docker Engine Authentication Bypass Vulnerability Exploited
Attackers are actively exploiting a critical vulnerability in the Docker Engine that…
Hamster Kombat Players Targeted in a New Malware Spreading Scheme
Players of Hamster Kombat have become prime targets for scammers promoting phishing…
New Telegram Scam Mimics Digital Wallets, Promotes Shady Apps
A new Telegram scam has emerged, leveraging bots functionality of the application…
Jellyfish Loader Malware Discovered, Threatens 2024 Olympics
A new threat has been discovered in the form of a Windows…
How to Prevent Email Spoofing
Types of Email Spoofing Email spoofing, also known as spoofing email, involves…