Daily Threat Intelligence – May 03 – 2023
TikTok as a popular app is lucrative to cybercriminals. After all, it has an ocean of data with billions of...
TikTok as a popular app is lucrative to cybercriminals. After all, it has an ocean of data with billions of...
In the wake of cybercriminals increasingly attempting to break into iOS, iPadOS, and macOS devices, and with a few exploits...
Cybercriminals are constantly devising new ways to evade detection by security software. In one such observation, researchers detected a change...
The abuse of Telegram has become a norm in the world of cybercrime. Of late, security researchers uncovered an unidentified...
The cyber adversaries abusing PaperCut flaws have been identified. Microsoft security team has reported that the recent attacks exploiting vulnerabilities...
Chinese cybercriminals were reported using new malware variants in their espionage attacks against South Africa and Nepal. The campaign includes...
The notorious Lazarus group has formulated a new malware family to threaten macOS users. The attackers have been discovered utilizing...
Promoting fake software downloads on search engines is a go-to tactic for cybercriminals. A recent discovery by cybersecurity experts has...
‘EvilExtractor’ - the name gives it away that nothing noble can be associated with it, let alone an education tool....
Google scrambles to address another high-severity zero-day in Chrome web browser, coming hot on the heels of Google releasing a...
Among the various attack vectors, unpatched vulnerabilities have always been a favored entrance route for threat actors to gain access...
Several critical sandbox escape disclosures have come to light in the past two weeks that allow attackers to execute malicious...
A rising trend has been identified among cybercriminals; they are using Action1 remote access software for reconnaissance activity and to...
Phishing attacks are a type of cyber attack where an attacker tries to trick you into revealing sensitive information, such...
With the U.S. reaching the end of its tax season, scammers are using this ideal time to target taxpayers. In...
Now you can protect yourself against BlackLotus UEFI bootkit attacks. The Incident Response team at Microsoft has pinpointed various stages...
Patch Tuesday is here! Microsoft, SAP, Adobe, Siemens, and Schneider Electric have rolled out security patch updates for their users....
Crypto exchanges are being targeted left, right, and center. A South Korean cryptocurrency exchange experienced a major attack that culminated...
Apple, as the maker of one of the most widely used devices, is also one of the most targeted brands....
Of late, security researchers stumbled across a group of English-speaking European teenagers who are offering services such as malware-as-a-subscription, hacking...
Cybercriminals can remotely open your garage door and even hijack any home alarm system. Now, that’s too much control. Recently,...
It seems we may have bumped across one of the fastest ransomware strains ever observed. Named Rorschach, it encrypts files...
Weekly Cyber Security Tip: Security Assessment and Testing One of the most important steps you can take to protect your...