Description Hackers are leveraging a trojanized Minesweeper clone to target finance organizations. The malicious game is used to deploy malware and s . . . Read more
The GPOC is NOT sending text messages about package delivery requiring payment! Scammers are targeting GPOC customers with phishing messages. Here . . . Read more
Description A new variant of data wiping malware, named AcidPour, has emerged in the cyber threat landscape, specifically designed to target Linux x86 . . . Read more
Description WordPress users are urged to take immediate action following the discovery of critical security vulnerabilities in two popular plugins dev . . . Read more
Description A critical security vulnerability (CVE-2024-22245) has been discovered in the VMware Enhanced Authentication Plugin (EAP), a tool allowing . . . Read more
Description Recently, an alarming security vulnerability was discovered in the widely used GNU C library (glibc), which exists in most major Linux ver . . . Read more
Description In an era where professional certifications play a pivotal role in career advancement and industry recognition, the emergence of certifi . . . Read more
Description Cybersecurity researchers from ESET uncovered a sophisticated cyberespionage campaign named “Operation Jacana” targeting a gov . . . Read more
Description A new Linux backdoor called “SprySOCKS” has raised significant concerns. This sophisticated malware is believed to be the work . . . Read more
Description A recent phishing campaign was observed utilizing the EvilProxy phishing tool to hijack Microsoft 365 accounts of high-level personnels at . . . Read more
Description A major Citrix ShareFile secure file transfer vulnerability, identified as CVE-2023-24489, is being targeted by unknown actors, according . . . Read more
Description Security researchers have issued a warning about an increase in phishing activity exploiting Google Accelerated Mobile Pages (AMP) to by . . . Read more