Daily Threat Intelligence – May 12 – 2023
Cryptomining attacks have become a prominent threat as they offer anonymity to illicit revenue earners in many ways. Security researchers...
Cryptomining attacks have become a prominent threat as they offer anonymity to illicit revenue earners in many ways. Security researchers...
Another covert activity aimed at intelligence gathering and data theft has been reported in Central Asia. A state-sponsored group is...
It’s that time of the month when software vendors and critical infrastructure industries issue security patches in bulk to address...
Unpatched security issues continue to be one of the top reasons enterprises suffer unauthorized intrusions. Lately, cybercriminals behind AndoryuBot botnet...
The stealth with which ransomware operations run today is highly intimidating to businesses. Researchers have stumbled across a couple of...
OpenAI is in the headlines again, however, this time it’s sensitive. A research group has detected a security hole in...
Operating with products that have reached End-of-Life (EoL) is an open invitation to malicious actors. Cisco is warning users of...
TikTok as a popular app is lucrative to cybercriminals. After all, it has an ocean of data with billions of...
In the wake of cybercriminals increasingly attempting to break into iOS, iPadOS, and macOS devices, and with a few exploits...
Cybercriminals are constantly devising new ways to evade detection by security software. In one such observation, researchers detected a change...
The abuse of Telegram has become a norm in the world of cybercrime. Of late, security researchers uncovered an unidentified...
The cyber adversaries abusing PaperCut flaws have been identified. Microsoft security team has reported that the recent attacks exploiting vulnerabilities...
Chinese cybercriminals were reported using new malware variants in their espionage attacks against South Africa and Nepal. The campaign includes...
The notorious Lazarus group has formulated a new malware family to threaten macOS users. The attackers have been discovered utilizing...
Promoting fake software downloads on search engines is a go-to tactic for cybercriminals. A recent discovery by cybersecurity experts has...
‘EvilExtractor’ - the name gives it away that nothing noble can be associated with it, let alone an education tool....
Google scrambles to address another high-severity zero-day in Chrome web browser, coming hot on the heels of Google releasing a...
Among the various attack vectors, unpatched vulnerabilities have always been a favored entrance route for threat actors to gain access...
Several critical sandbox escape disclosures have come to light in the past two weeks that allow attackers to execute malicious...
A rising trend has been identified among cybercriminals; they are using Action1 remote access software for reconnaissance activity and to...
Phishing attacks are a type of cyber attack where an attacker tries to trick you into revealing sensitive information, such...
With the U.S. reaching the end of its tax season, scammers are using this ideal time to target taxpayers. In...
Now you can protect yourself against BlackLotus UEFI bootkit attacks. The Incident Response team at Microsoft has pinpointed various stages...
Patch Tuesday is here! Microsoft, SAP, Adobe, Siemens, and Schneider Electric have rolled out security patch updates for their users....