Description New variants of the Medusa malware have been identified, specifically targeting Android users across seven countries. This development un . . . Read more
Description A new malware distribution campaign has emerged, using fake Google Chrome, Microsoft Word, and OneDrive errors to trick users into executi . . . Read more
Description A new phishing campaign has emerged, exploiting the Windows search protocol (search-ms URI) to distribute malicious scripts. This method . . . Read more
Description The DarkGate malware-as-a-service (MaaS) operation has transitioned from using AutoIt scripts to an AutoHotkey mechanism in its latest cy . . . Read more
Description Hackers are leveraging a trojanized Minesweeper clone to target finance organizations. The malicious game is used to deploy malware and s . . . Read more
The GPOC is NOT sending text messages about package delivery requiring payment! Scammers are targeting GPOC customers with phishing messages. Here . . . Read more
Description A new variant of data wiping malware, named AcidPour, has emerged in the cyber threat landscape, specifically designed to target Linux x86 . . . Read more
Description WordPress users are urged to take immediate action following the discovery of critical security vulnerabilities in two popular plugins dev . . . Read more
Description A critical security vulnerability (CVE-2024-22245) has been discovered in the VMware Enhanced Authentication Plugin (EAP), a tool allowing . . . Read more
Description Recently, an alarming security vulnerability was discovered in the widely used GNU C library (glibc), which exists in most major Linux ver . . . Read more
Description In an era where professional certifications play a pivotal role in career advancement and industry recognition, the emergence of certifi . . . Read more
Description Cybersecurity researchers from ESET uncovered a sophisticated cyberespionage campaign named “Operation Jacana” targeting a gov . . . Read more