Over 75 Applications on Google Play with 13M Installations Deliver Adware

0
Researchers from HUMAN’s Satori Threat Intelligence team found a new adware operation named ‘Scylla’, which is the third wave of an attack reported in...

Hackers Using PowerPoint Mouseover Trick to Infect System with Malware

0
  The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in...

Improve your security posture with Wazuh, a free and open source XDR

0
Organizations struggle to find ways to keep a good security posture. This is because it is difficult to create secure system policies and find...

Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware

0
A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT). "This campaign features enhancements and...

Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely

0
WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could lead to remote code execution...

Why Continuous Security Testing is a Must for Organizations Today

0
The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow...

CISA Warns of Hackers Exploiting Critical Atlassian Bitbucket Server Vulnerability

0
  The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a recently disclosed critical flaw impacting Atlassian's Bitbucket Server and Data Center to...

The Importance of Managing Your Data Security Posture

0
Data security is reinventing itself. As new data security posture management solutions come to market, organizations are increasingly recognizing the opportunity to provide...

Should You Use a VPN for Online Security? 4 Types of Malware and How...

0
A VPN creates an encrypted tunnel between your device and the VPN server. All of your data transmissions are protected by the VPN’s encrypted...

Ukraine’s DELTA Military System Users Under Attack from Info Stealing Malware

0
Dec 21, 2022Ravie LakshmananCyber War / Cyber Attack The Computer Emergency Response Team of Ukraine (CERT-UA) this week disclosed that users of the Delta...