No menu items!
No menu items!
More

    News

    OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script

    Jul 30, 2024Ravie LakshmananMalware / Email Security Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim...

    VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access

    A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by "several" ransomware groups to gain elevated permissions and deploy...

    Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild

    Jul 29, 2024Ravie LakshmananEnterprise Security / Data Protection Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure (ACI)...

    Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails

    An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in email security vendor Proofpoint's...

    How Searchable Encryption Changes the Data Security Game

    Searchable Encryption has long been a mystery. An oxymoron. An unattainable dream of cybersecurity professionals everywhere. Organizations know they must encrypt their most valuable,...

    ‘Stargazer Goblin’ Creates 3,000 Fake GitHub Accounts for Malware Spread

    A threat actor known as Stargazer Goblin has set up a network of inauthentic GitHub accounts to fuel a Distribution-as-a-Service (DaaS) that propagates...

    Gh0st RAT Trojan Targets Chinese Windows Users via Fake Chrome Site

    Jul 29, 2024NewsroomCybersecurity / Cyber Espionage The remote access trojan known as Gh0st RAT has been observed being delivered by an "evasive dropper" called...

    French Authorities Launch Operation to Remove PlugX Malware from Infected Systems

    Jul 27, 2024NewsroomMalware / Cyber Intelligence French judicial authorities, in collaboration with Europol, have launched a so-called "disinfection operation" to rid compromised hosts of...

    Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials

    Jul 27, 2024NewsroomCybersecurity / Cloud Security Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS...

    Latest articles

    spot_imgspot_img