Over 75 Applications on Google Play with 13M Installations Deliver Adware

0
Researchers from HUMAN’s Satori Threat Intelligence team found a new adware operation named ‘Scylla’, which is the third wave of an attack reported in...

Hackers Using PowerPoint Mouseover Trick to Infect System with Malware

0
  The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in...

Improve your security posture with Wazuh, a free and open source XDR

0
Organizations struggle to find ways to keep a good security posture. This is because it is difficult to create secure system policies and find...

Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware

0
A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT). "This campaign features enhancements and...

Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely

0
WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could lead to remote code execution...

Why Continuous Security Testing is a Must for Organizations Today

0
The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow...

BlackCat Ransomware Attackers Spotted Fine-Tuning Their Malware Arsenal

0
The BlackCat ransomware crew has been spotted fine-tuning their malware arsenal to fly under the radar and expand their reach. "Among some of the more...

U.S. Cybersecurity Agency Raises Alarm Over Royal Ransomware’s Deadly Capabilities

0
Mar 03, 2023Ravie LakshmananEndpoint Security / Ransomware The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a new advisory about Royal ransomware, which...

Pay What You Want for This Collection of White Hat Hacking Courses

0
Whether you relish a mental challenge or fancy a six-figure paycheck, there are many good reasons to get into white hat hacking. That said,...

Phishing Attack Prevention Checklist – A Detailed Guide

0
In today’s interconnected world, where digital communication and transactions dominate, phishing attacks have become an ever-present threat.By masquerading as trustworthy entities, phishing attacks deceive...