Cybersecurity News | Quick Read
Deep Fakes of Elon Musk Promote BitVex Fraud
Scammers Are Using Bogus Elon Musk Videos to Promote a BitVex Trading Platform Fraud that Takes Deposited Money.
Cybersecurity News | Quick Read
500,000 Chicago Students' Data Exposed in Ransomware Attack
Battelle for Kids, Chicago Public Schools’ Vendor Experienced a Ransomware Attack.
Cybersecurity News | Quick Read
Conti Ransomware Shuts Down and Rebrands Itself
Despite Dropping the Conti Name, the Criminal Group Will Remain a Major Player in the Ransomware Landscape.
Cybersecurity News | Quick Read
Ransomware Hits Media Giant Nikkei’s Asian Unit
Hackers Gained Unauthorized Access to the Company’s Server.
Cybersecurity News | Quick Read
Ransomware Targets Higher Education Institutions
Three Educational Institutions Hit by Ransomware over Three Months.
Cybersecurity News | Quick Read
Specialists Spend a Lot of Time Fixing Security Flaws that Could Have Been Prevented
New Study Shows that it Takes Specialists Over Five Hours to Fix Vulnerabilities Found during the App Development Process.
Cybersecurity News | Quick Read
Jupiter Plugin Vulnerabilities Enable Hackers to Hijack Websites
WordPress Security Researchers Found Vulnerabilities Allowing Privilege Escalation.
Uncategorized | Quick Read
Cybersecurity News | Quick Read
Millions of Cyberattacks Are Targeting Tatsu WordPress Plugin
Hackers Are Leveraging CVE-2021-25094, a Remote Code Execution Vulnerability.
Cybersecurity News | Quick Read
Top 10 Attack Vectors Most Exploited by Hackers Revealed
A Joint Advisory Describes Most Preferred Initial Access Attack Vectors by Threat Actors.
Cybersecurity News | Quick Read
Malicious PHP Code Used to Steal Banking Information, FBI Said
What Are the FBI’s Recommended Mitigations?
Cybersecurity News | Quick Read
'Thanos' Ransomware Builder Was Designed by a Physician
A French-Venezuelan Doctor Allegedly Created “Thanos” Ransomware and Other Cybercriminal Tools.
Cybersecurity News | Quick Read
NerbianRAT Trojan Spreads via Emails
Written in GO, the Malware Can Bypass Detection and Analysis.
Cybersecurity News | Quick Read
Phishing Threat Actors Still Fond of HTML Attachments
Here’s an Important Thing You Need to Know about HTML Attachments that Might Save You a Lot of Trouble.
Cybersecurity News | Quick Read
Serious Flaw in Firewalls and VPNs Manufactured by Zyxel Exploited
The Vulnerability Is Tracked as CVE-2022-30525 and Is a Command Injection Vulnerability.
Cybersecurity News | Quick Read
New Cybersecurity Directive Agreed between the European Parliament and EU Member States
The New Legislation Will Bring About a Greater Cybersecurity Level across the European Union.
Cybersecurity News | Quick Read
At Least 14 German Automakers Targeted by Malware Campaign
Phishing, an Everyday Cyberthreat!
Email Security | Quick Read
Business Email Security Contributes to Business Stability
Here’s Everything to Know About Business Email Security.
Cybersecurity News | Quick Read
Cybercriminals Launch a New Malware-as-a-Service: the 'Eternity Project'
Hackers Can Choose Between an Info-stealer, a Miner, a Worm Spreader, or Ransomware Tools. Or They Can Get Them All!
Cybersecurity News | Quick Read
BPFdoor Has the Capacity to Bypass Firewalls
A New Linux Malware Has Been Discovered That Shows Anti-Evasion Techniques.
Cybersecurity News | Quick Read
WordPress Websites Files and Databases Injected with Malicious JavaScript
The Malicious Campaign Allowed the Attacker the Ability to Redirect the Website Users to a Location of Their Choosing.
Endpoint security | Quick Read
All You Need to Know about Remote Monitoring Management Software. A List of Open-Source RMM.
Cybersecurity News | Quick Read
South Asian Governments Targeted by Bitter APT Group
Based on Two Infection Chains, the Campaign Employes Malware with Remote File Execution Capabilities.
Cybersecurity News | Quick Read
Nerbian RAT Malware, New Threat on the Market
The New Remote Access Trojan Spreads Using COVID-19 and World Health Organization Themes.
Cybersecurity News | Quick Read
Hackers Are Going After Managed Security Providers
According to the FBI, CISA, and the NSA, Supply Chain Attacks Are Becoming More Common.
Cybersecurity News | Quick Read
New Phishing-as-a-Service Toolkit Discovered
Cybercriminals May Use Frappo to Attack Major Financial Institutions and Online Retailers.
Cybersecurity News | Quick Read
Windows Print Spooler Exploit: the Path for Threat Actors to Perform 65,000 Cyberattacks
Global Cyberattacks Have Grown Following Hacker’s Exploitation of a Print Spooler Bug.
Cybersecurity News | Quick Read
Don’t Underestimate the DCRat Malware!
Despite Its Low Cost, the Malware Has a Wide Range of Capabilities.
Cybersecurity News | Quick Read
Critical F5 BIG-IP Vulnerability Exploited by Hackers
Several F5 BIG-IP Modules Are Impacted.
One Platform. Total Security.
Experience the Power of Heimdal XDR the Unified Security Platform that Delivers Comprehensive Protection against Next-gen Threats