The Return of GootLoader: A New Wave of Cyber Attacks Unveiled Recent findings from cybersecurity firm Huntress have revealed a resurgence in GootLoader activity, with three...
Disruption of Rhadamanthys Infostealer Operation: What You Need to Know The Rhadamanthys infostealer operation recently faced a major disruption, leading to several “customers” of the malware-as-a-service...
Fantasy Hub: The New Android Remote Access Trojan Threat A recent discovery by cybersecurity researchers has unveiled a new Android remote access trojan (RAT) known as...
Cybercriminals have taken advantage of a critical vulnerability and the integrated antivirus feature in Gladinet’s Triofox file-sharing and remote access platform to execute remote code with...
GlobalLogic Data Breach: What You Need to Know A recent data breach at GlobalLogic, a digital engineering services provider, has affected over 10,000 current and former...
North Korean threat actors are exploiting Google’s Find Hub feature to monitor the GPS coordinates of their targets and remotely restore Android devices to their factory...
Last week, cyber threats continued to evolve, with attackers deploying increasingly sophisticated tactics. Malware hidden in virtual machines, side-channel leaks compromising AI conversations, and spyware targeting...
CISA Issues Urgent Patch Order for Critical Samsung Vulnerability Exploited in LandFall Spyware Attacks The Cybersecurity and Infrastructure Security Agency (CISA) has directed U.S. federal agencies...
Protect Your Business from LinkedIn Phishing Attacks Phishing attacks have evolved beyond emails, with a significant 34% now occurring on non-email platforms such as social media,...
Protect Yourself from iPhone Phishing Scams iPhone users beware! The Swiss National Cyber Security Centre (NCSC) has issued a warning about a new phishing scam targeting...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.