Google Joins Forces with GASA and DNS RF to Tackle Online Scams at Scale

Google on Wednesday announced a new partnership with the Global Anti-Scam Alliance (GASA) and DNS Research Federation (DNS RF) to combat online scams.The initiative,...

WordPress Hunk Companion Plugin Flaw Exploited to Silently Install Vulnerable Plugins

Malicious actors are exploiting a critical vulnerability in the Hunk Companion plugin for WordPress to install other vulnerable plugins that could open the door...

Arid Viper Launches Mobile Espionage Campaign with AridSpy Malware

The threat actor known as Arid Viper has been attributed to a mobile espionage campaign that leverages trojanized Android apps to deliver a spyware...
russian hack

Russian Group Attacks Anti-Doping Agencies

A hacker group linked to Moscow has been targeting anti-doping organizations across the world with substantial cyberattacks as anti-doping authorities have mulled new allegation...

Recover from Ransomware in 5 Minutes—We will Teach You How!

Dial Back to Just Seconds Before an AttackZerto, a Hewlett Packard Enterprise company, can help you detect and recover from ransomware in near real-time....

Ransomware Double-Dip: Re-Victimization in Cyber Extortion

In our dataset of over 11,000 victim organizations that have experienced a Cyber Extortion / Ransomware attack, we noticed that some victims re-occur. Consequently,...

New Banking Trojan CHAVECLOAK Targets Brazilian Users via Phishing Tactics

Users in Brazil are the target of a new banking trojan known as CHAVECLOAK that's propagated via phishing emails bearing PDF attachments."This intricate attack...

AppSec Webinar: How to Turn Developers into Security Champions

Let's face it: AppSec and developers often feel like they're on opposing teams. You're battling endless vulnerabilities while they just want to ship code....

WhatsApp hacking

Who might have believed that the method of signing into WhatsApp records could be abused to hack client information without their insight? How is it...

New PEAKLIGHT Dropper Deployed in Attacks Targeting Windows with Malicious Movie Downloads

Cybersecurity researchers have uncovered a never-before-seen dropper that serves as a conduit to launch next-stage malware with the ultimate goal of infecting Windows systems...

Follow Us Here!

372FansLike
332FollowersFollow
323FollowersFollow

Popular Posts