Mac security

Zloader malware is abusing Microsoft e-signature to steal sensitive data

A new campaign is identified by security researchers manipulating the Microsoft e-signature and deploying Zloader malware that steals banking credentials.

3 years ago

Elephant Beetle steals millions of dollars from organizations worldwide

A threat actor that goes by the name 'Elephant Beetle' is using a combination of around 80 tools to steal…

3 years ago

Purple Fox malware is actively distributed via Telegram Installers

Purple Fox malware is distributed via malicious Telegram Desktop Installer, this malware installs further payloads on the affected devices.

3 years ago

441K RedLine Malware affected accounts are included by Have I Been Pwned

If you're wondering whether your email account is compromised by RedLine malware, you can check the same with 'Have I…

3 years ago

AvosLocker Ransomware Group gives decryptor after breaching US Police

AvosLocker Ransomware group has given a free decryptor after accidentally encrypting a US government agency.

3 years ago

Blister malware can breach your devices in absolute stealth

A new malicious campaign was discovered by security researchers that disguises malicious code as legitimate exe files. The researchers have…

3 years ago

Dridex malware is sending fake termination emails to employees

A phishing campaign is ongoing and deploying a new malware called Dridex. This campaign sends fake employee termination emails so…

3 years ago

What is Cybersecurity and why is it important

Cybersecurity is a process of managing and securing networks, servers, computers, users, mobile devices, applications, and databases from cyberattacks, data…

3 years ago

CISA asks Admins to patch VMware Workspace ONE UEM vulnerability

CISA has requested VMware users to patch a critical vulnerability in the Workspace ONE UEM that cyber criminals could exploit…

3 years ago

Log4j Vulnerability exploiters evolve the attack vector to mine Monero

Cyber criminals are exploiting the Apache Log4j vulnerability and have switched their maneuvers from LDAP callback URLs to RMI or…

3 years ago