The threat actors make use of text messaging management services that are meant for business, to launch their attack that redirect SMS to reach the victim’s phone number to the systems that are controlled by them...
A new wave of ongoing cyberattacks that are abusing various vulnerabilities to deploy Mirai variants on compromised systems has been uncovered on Monday by cybersecurity researchers....
A data leak from stolen payment cards from compromised online stores is a new trick adopted by threat actors these days
32 Indian organizations have been attacked by threat actors who abused flaws in unpatched Microsoft business email servers
A new side-channel has been discovered by researchers that can be reliably abused to disclose details from web browsers that could leveraged to track users even when Javascript is fully disabled....
The researchers from the Sakura Samurai hacking group breached Indian government websites exposed .git directories and .env files on some of these cyber systems....
‘Promoted’ tweets commonly known as Twitter ads are now used by hackers to distribute cryptocurrency giveaway scams
Google has released second fix in a month as the company has addressed another actively abused zero-day in Chrome browser
Cybercriminals are leveraging the heavily abused ProxyLogon Exchange Server vulnerabilities to install a New strain of ransomware, name “DearCry” ...
A new malware, dubbed “NimzaLoader” written in Nim programming language has been launched by a hacker
Sign up to our Weekley Threat Digest and keep apace of the trends shaping Cybersecurity.