Operation Alice Takes Down 373,000 Fake CSAM Sites An extensive international law enforcement effort known as Operation Alice successfully dismantled over 373,000 dark web sites that...
Microsoft Azure Monitor Alerts Used in Callback Phishing Scam In recent phishing attacks, threat actors have been exploiting Microsoft Azure Monitor alerts to deceive users into...
The Rise of VoidStealer: A New Breed of Information Stealer In the realm of cybersecurity, a new threat has emerged known as VoidStealer. This sophisticated malware...
Google Introduces Advanced Flow for Secure APK Sideloading on Android Google has recently unveiled a new feature in Android called Advanced Flow. This mechanism is designed...
Ransomware Threats Utilize Vulnerable Drivers to Evade Detection An analysis of endpoint detection and response (EDR) killers has uncovered that 54 of them employ a tactic...
The Trivy vulnerability scanner was compromised in a supply-chain attack by threat actors known as TeamPCP, which distributed credential-stealing malware through official releases and GitHub Actions....
The lures redirect visitors to a malicious website hosting the AutoHotKey backdoor, which enables threat actors to execute arbitrary commands on the compromised system. The campaign...
Oracle Releases Critical Security Update for Identity Manager and Web Services Manager Update: Oracle has not confirmed if the vulnerability has been exploited. Oracle has urgently...
Exploring the Rise of Endpoint Detection and Response (EDR) Killers An in-depth analysis of endpoint detection and response (EDR) killers has uncovered that 54 of these...
Russian Intelligence-Linked Threat Actors Targeting Encrypted Messaging Apps In a recent public service announcement, the FBI has cautioned users of encrypted messaging apps like Signal and...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.