Description Sites Are at Risk of Cyber attacks Due to a New Vulnerability in a Popular WordPress Plugin. By deceiving a privileged user into visiting . . . Read more
Description A new ransomware has been detected known as Cactus. It has the capabilities of exploiting vulnerabilities in Virtual Private Network (VPN . . . Read more
Description The ViperSoftX malware, making headlines in 2022 as a cryptocurrency stealer receives new updates where the malware targets passwords ma . . . Read more
Description It has been discovered that an infostealer is mimicking a ChatGPT Windows desktop client that has the capabilities of copying saved cred . . . Read more
Description Cybersecurity researchers discovered a new malware dubbed LOBSHOT that is being spread via Google ads. By employing hVNC, this vir . . . Read more
Description RTM Locker is the most current ransomware campaign that targets organizations and has been found to target virtual machines on VMware ESX . . . Read more
Description A new python-based credential harvester and hacktool named Legion targets multiple services and exploits for the purpose of phishing and . . . Read more
Description A new Go-based botnet called HinataBot was discovered targeting specific devices and recruiting them into a botnet swarm capable of pote . . . Read more
Description A recently found Golang-based botnet malware searches for and attacks web servers running the phpMyAdmin, MySQL, FTP, and Postgres servi . . . Read more
Description The ransomware threat actor group called Medusa has emerged recently, targeting mostly corporate victims worldwide with million-dollar ra . . . Read more
Description A brand-new, highly sophisticated piece of malware called HiatusRAT preys on various routers made for business use. Two harmful files are . . . Read more
Description A cyber espionage group known as Mustang Panda has released a new custom backdoor malware that uses the MQTT protocol for its communicat . . . Read more