Category: Articles

Hackers Use Malware to Install 0bj3ctivity Stealer and ...

During different campaigns, threat actors have been seen delivering malware like VIP Keylogger and 0bj3ctivity Stealer by hiding d...

Ghanian Banks are Warned By ACDT About The Possibility ...

Following A Recent Worldwide Tech Failure, Ghana's Banks, Savings And Loan Organizations, And Rural banks Were Warned By The Afric...

Problems Found in the Rsync File Synchronization Tool b...

The well-known Rsync file-synchronization utility for Unix systems has up to six security flaws that have been revealed; some of t...

Hackers With Ties To Russia Use HATVIBE Malware To Targ...

An Ongoing Cyber Espionage Campaign Targeting Kazakhstan As Part Of The Kremlin's Aim To Obtain Political And Economic Intelligen...

With $24 billion in cryptocurrency transactions, the il...

The Telegram-based marketplace HuiOne Guarantee and its associated vendors have collectively amassed over $24 billion in cryptocur...

Infostealers Are Hidden by Cyberattackers in Google Sea...

Attackers are exploiting YouTube and Google search results to target individuals seeking pirated or cracked software downloads, ac...

Microsoft Takes Action Against Malicious Use of Copilot...

Microsoft's Digital Crimes Unit is actively pursuing legal action against cybercriminals who exploit generative AI (GenAI) service...

Critical macOS Vulnerability Exposed: Urgent Patch Rele...

A high-severity vulnerability (CVE-2024-54498) in macOS's Sandbox feature has been exploited in a newly published proof-of-concept...

The Evolution of Security Orchestration: Transforming S...

Security Orchestration, Automation, and Response (SOAR) has fundamentally transformed how organizations approach cybersecurity ope...

Critical Juniper Networks Vulnerability Exposes Network...

A critical vulnerability has been discovered in Juniper Networks' Junos OS and Junos OS Evolved platforms that could allow remote ...

Green Bay Packers Online Store Hack Exposes Credit Card...

The Green Bay Packers confirmed a data breach affecting over 8,500 customers. Malicious code inserted into their online store expo...

Palo Alto Networks Patches Severe Vulnerabilities in Ex...

Palo Alto Networks has issued patches for several high-severity vulnerabilities in its discontinued Expedition migration tool, whi...

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies.