New NullMixer Malware Campaign Stealing Users’ Payment Data and Credentials

0
  Cybercriminals are continuing to prey on users searching for cracked software by directing them to fraudulent websites hosting weaponized installers that deploy malware called...

Experts Uncover 85 Apps with 13 Million Downloads Involved in Ad Fraud Scheme

0
  As many as 75 apps on Google Play and 10 on Apple App Store have been discovered engaging in ad fraud as part of...

Hacker Behind Optus Breach Releases 10,200 Customer Records in Extortion Scheme

0
The Australian Federal Police (AFP) on Monday disclosed it's working to gather "crucial evidence" and that it's collaborating with overseas law enforcement authorities following...

LastPass Admits to Severe Data Breach, Encrypted Password Vaults Stolen

0
Dec 23, 2022Ravie LakshmananPassword Management / Data Breach The August 2022 security breach of LastPass may have been more severe than previously disclosed by...

What Stricter Data Privacy Laws Mean for Your Cybersecurity Policies

0
Dec 09, 2022The Hacker NewsData Protection / Privacy For today's businesses data privacy is already a big headache, and with modern privacy laws expanding...

Over 75 Applications on Google Play with 13M Installations Deliver Adware

0
Researchers from HUMAN’s Satori Threat Intelligence team found a new adware operation named ‘Scylla’, which is the third wave of an attack reported in...

RCE Bug in ZOHO Products Let Hackers Execute Arbitrary Code Remotely

0
CISA’s bug catalog has been updated with a new vulnerability related to Java deserialization, which has been exploited in the wild by malicious threat...

Russia Plan a Massive Cyber Attack on Ukraine’s Infrastructure

0
There has been a warning recently issued by the Ukrainian military intelligence service about massive cyberattacks from Russia. As part of its plan to...

BIND DNS Software High-Severity Flaws Let Hackers Trigger the Attack

0
The ISC (Internet Systems Consortium) released a security patch this week in an attempt to address six vulnerabilities that could allow remote attackers to...

New Go-based Malware Attack Windows & Linux Systems

0
The cybersecurity researchers at Lumen’s Black Lotus Labs asserted that in order to mine crypto-currencies and launch DDoS attacks, hackers are deploying an existing...