Description The APT37 group ScarCruft adopts a new infection chain technique by using LNK files to deliver their malware, RokRAT. Details  . . . Read more
Description One of WordPress” most popular Elementor plugins known as “Essential Addons for Elementor,” was discovered to be vulne . . . Read more
Description Microsoft calls Tuesday Patch Tuesday where they accumulate security updates which are released on the second Tuesday of each month. Thi . . . Read more
Description “FluHorse” is a new Android malware discovered by Check Point Research targeting Eastern Asia since May 2022. It”s dis . . . Read more
Description The new Akira ransomware operation has been targeting enterprise networks worldwide, breaching network, encrypting files, and demanding . . . Read more
Description Sites Are at Risk of Cyber attacks Due to a New Vulnerability in a Popular WordPress Plugin. By deceiving a privileged user into visiting . . . Read more
Description A new ransomware has been detected known as Cactus. It has the capabilities of exploiting vulnerabilities in Virtual Private Network (VPN . . . Read more
Description The ViperSoftX malware, making headlines in 2022 as a cryptocurrency stealer receives new updates where the malware targets passwords ma . . . Read more
Description It has been discovered that an infostealer is mimicking a ChatGPT Windows desktop client that has the capabilities of copying saved cred . . . Read more
Description Cybersecurity researchers discovered a new malware dubbed LOBSHOT that is being spread via Google ads. By employing hVNC, this vir . . . Read more
Description RTM Locker is the most current ransomware campaign that targets organizations and has been found to target virtual machines on VMware ESX . . . Read more
Description A new python-based credential harvester and hacktool named Legion targets multiple services and exploits for the purpose of phishing and . . . Read more