Cybersecurity Blog
OneDrive Phishing Scam Tricks Users into Running Malicious PowerShell Script
Cybersecurity researchers are warning about a new phishing campaign that targets Microsoft OneDrive users with the aim ...
VMware ESXi Flaw Exploited by Ransomware Groups for Admin Access
A recently patched security flaw impacting VMware ESXi hypervisors has been actively exploited by “several” ...
Critical Flaw in Acronis Cyber Infrastructure Exploited in the Wild
Cybersecurity company Acronis is warning that a now-patched critical security flaw impacting its Cyber Infrastructure ...
Report: Russian Ransomware Gangs Account for 69% of all Ransom Proceeds
According to an analysis by TRM Labs, Russian-speaking threat actors were responsible for over 69% of all ...
Despite Bans, AI Code Generation Tools Widely Used in Organizations
Despite bans, organizations are widespread in using AI code tools, causing security concerns, as reported by Checkmarx. ...
Proofpoint Email Routing Flaw Exploited to Send Millions of Spoofed Phishing Emails
An unknown threat actor has been linked to a massive scam campaign that exploited an email routing misconfiguration in ...
Senators to FTC: Car Companies’ Data Privacy Practices Must be Investigated
U.S. senators have raised concerns about how car companies handle consumer data, revealing that major automakers share ...
WhatsApp for Windows Lets Python, PHP Scripts Execute with no Warning
WhatsApp currently blocks certain file types considered risky, but Python and PHP scripts are not included in the ...