A new campaign is identified by security researchers manipulating the Microsoft e-signature and deploying Zloader malware that steals banking credentials.
A threat actor that goes by the name 'Elephant Beetle' is using a combination of around 80 tools to steal…
Purple Fox malware is distributed via malicious Telegram Desktop Installer, this malware installs further payloads on the affected devices.
If you're wondering whether your email account is compromised by RedLine malware, you can check the same with 'Have I…
AvosLocker Ransomware group has given a free decryptor after accidentally encrypting a US government agency.
A new malicious campaign was discovered by security researchers that disguises malicious code as legitimate exe files. The researchers have…
A phishing campaign is ongoing and deploying a new malware called Dridex. This campaign sends fake employee termination emails so…
Cybersecurity is a process of managing and securing networks, servers, computers, users, mobile devices, applications, and databases from cyberattacks, data…
CISA has requested VMware users to patch a critical vulnerability in the Workspace ONE UEM that cyber criminals could exploit…
Cyber criminals are exploiting the Apache Log4j vulnerability and have switched their maneuvers from LDAP callback URLs to RMI or…