Cybersecurity News | Quick Read
Mali GPU 'Patch Gap' Leaves Android Users Vulnerable To Attacks
Five Unpatched Flaws In Arm’s Mali GPU Driver Are Leaving Android Users At Risk.
Cybersecurity News | Quick Read
Meta Takes Down Clusters of Fake Accounts Associated with the U.S Military
The Instagram and Facebook Accounts Were Used in Covert Influence Operations.
Cybersecurity News | Quick Read
487 Million WhatsApp Users Mobile Numbers for Sale on Hacking Forum
The Dataset Is Believed to Contain User Data from 84 Countries.
Cybersecurity News | Quick Read
The Ducktail Malware Operation Gains New Capabilities
The New Version of the Malware Is Now Harder to Detect.
Cybersecurity News | Quick Read
Black Basta Ransomware Gang Infiltrates U.S. Companies via Qakbot Malware
Researchers Observed a Higher Rate of Infections Targeting U.S. Organizations.
Cybersecurity News | Quick Read
EU Parliament Site Attacked by Russian Hacktivists
The Site Was Taken Down by Pro-Russian Hackers in a DDoS Attack.
Vulnerability | Quick Read
The Anatomy of PTaaS: What Is Penetration Testing as a Service
Learn All About PTaaS And How It Can Protect Your Security Posture.
Cybersecurity News | Quick Read
Microsoft Email Security Eluded by Instagram Credential Phishing Attacks
Threat Actors Impersonating Instagram Tried Hacking 22,000 Students.
Cybersecurity News | Quick Read
Hackers Are Increasingly Using Aurora Infostealer Malware
The Malware’s Rise in Popularity Is Due to Its Capabilities to Steal Data While Maintaining a Stable Infrastructure and Functionality.
Cybersecurity News | Quick Read
SharkBot Malware Infects Thousands Of Android Users With A Hidden File Manager App
Trojan Malware Drops on Android Devices as a Fake Antivirus.
Cybersecurity News | Quick Read
Discontinued Server Flaws Used by Hackers to Target Energy Orgs
Indian Electrical Grid Operators Targeted by Chinese State-Sponsored Group.
Cybersecurity News | Quick Read
Donut Extortion Group Targets Victims with Double-Extortion Ransomware Attacks
Multiple Companies Already Affected by the Operation.
Cybersecurity News | Quick Read
Google Ads Used to Distribute Royal Ransomware in Malvertising Campaign
Researchers Warn about DEV-0569 Deploying Malicious Downloader.
Cybersecurity News | Quick Read
Luna Moth Is Making Big Money on Callback Phishing Campaigns
Hundreds of Thousands of Dollars Extorted by New Social Engineering Methods.
Cybersecurity Basics | Quick Read
Learn about DNS Scavenging & Aging and their Role in DNS security.
Cybersecurity News | Quick Read
Sensitive Data From Nuclear Facilities Leaked on Dark Web
Confidential Data and PII Made Public on Cybercrime Forums.
Cybersecurity News | Quick Read
Apps with Over 3 Million Downloads Leak Algolia API Keys
Sensitive Information, at Risk of Being Exposed.
Cybersecurity News | Quick Read
PII Breach Discovered on Bahmni Hospital Management System
Hundreds of Thousands of People Had Their Electronic Medical Records Exposed.
Cybersecurity News | Quick Read
AirAsia Falls Victim to Daixin Ransomware Gang
Threat Actors Stole Data Belonging to 5 Million Passengers and Employees.
Cybersecurity News | Quick Read
A Google Chrome Extension Is Helping Hackers Steal Cryptocurrency Passwords
VenomSoftX: New Malware Drains Cryptocurrency Via Google Chrome.
Cybersecurity News | Quick Read
New Ransomware Trick: Encrypting Files Then Stealing Discord Accounts
Introducing AXLocker: The 2-in-1 Virus
Cybersecurity News | Quick Read
Vanuatu Government Systems Taken Offline by Hackers
Parliament and Police Websites Disabled for More Than Two Weeks by Cyber Criminals.
Cybersecurity News | Quick Read
10 Suspects Charged for BEC Scams Targeting Federal Funding Programs
Their Scams Lead to the Loss of Over $11.1 Million, According to the U.S. Department of Justice.
Cybersecurity News | Quick Read
Chinese Group Mustang Panda’s Spear Phishing Campaign Targets Multiple Organizations Worldwide
The Group Uses Google Drive and Dropbox Links to Deploy the Malware.
Vulnerability | Quick Read
External Penetration Testing: What It Is And Why You Should Care
Learn How to Identify Vulnerabilities that Attackers May Exploit.
Cybersecurity News | Quick Read
Digital Personal Data Protection Bill 2022 Is Under Discussion in India
This Is the Fourth Version Proposed by the Indian Government Since 2018.
Cybersecurity News | Quick Read
Zeppelin Ransomware Decryption Tool Secretly Deployed to Aid Victims
Researchers Exploited the Vulnerabilities for Over Two Years.
Endpoint security | Quick Read
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats