Description In August 2022, a business email compromise campaign has been targeting Microsoft 365 organizations, managing to exploit Microsofts Multi- . . . Read more
Description Several design flaws/vulnerabilities in Microsoft Teams allow threat actors to carry out phishing attacks, covertly execute malicious co . . . Read more
Description Shikitega, a new stealthy Linux malware, has been found to infect computers and IoT devices with extra payloads. Summary The malwa . . . Read more
Description A new phishing as a service (PaaS) platform called EvilProxy has surfaced on the Dark Web and boasts advanced phishing techniques capabl . . . Read more
Description The notorious banking trojan SharkBot has resurfaced once again on the Google Play Store, disguised behind Antivirus and Cleaner applicat . . . Read more
Description A Golang-based malware campaign dubbed GO#WEBBFUSCATOR leverages the infamous James Webb telescope deep field image to deliver malware to . . . Read more
Description The Turkish based crypto miner malware campaign called Nitrokod was seen infecting machines in eleven countries across the world using po . . . Read more
Description Threat actors have reportedly hacked WordPress sites to deliver malware (NetSupport RAT and Raccoon Stealer) by displaying fraudulent Clo . . . Read more
What is Bumblebee Malware? Bumblebee, a malware loader (Small malicious programs that download and execute additional payloads on compromised machine . . . Read more
Description A hacker group called Charming Kitten has developed an instrument designed to download email contents from Gmail, Yahoo and Microsoft Out . . . Read more
Description An exploit code has been deployed to address a critical vulnerability affecting networking devices equipped with Realtek”s RTL819x . . . Read more
Description Google has released a security update in the form of patches for the Chrome browser. This security update addresses several vulnerabilitie . . . Read more