Cybersecurity Blog
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
ESET researchers discovered a zero-day exploit targeting Telegram for Android, called EvilVideo. This exploit allowed ...
Ukrainian Institutions Targeted Using HATVIBE and CHERRYSPY Malware
The Computer Emergency Response Team of Ukraine (CERT-UA) has alerted of a spear-phishing campaign targeting a ...
Google Abandons Plan to Phase Out Third-Party Cookies in Chrome
Google on Monday abandoned plans to phase out third-party tracking cookies in its Chrome web browser more than four ...
Experts Uncover Chinese Cybercrime Network Behind Gambling and Human Trafficking
The relationship between various TDSs and DNS associated with Vigorish Viper and the final landing experience for the ...
PINEAPPLE and FLUXROOT Hacker Groups Abuse Google Cloud for Credential Phishing
A Latin America (LATAM)-based financially motivated actor codenamed FLUXROOT has been observed leveraging Google Cloud ...
How to Set up an Automated SMS Analysis Service with AI in Tines
The opportunities to use AI in workflow automation are many and varied, but one of the simplest ways to use AI to save ...
Fake Grand Theft Auto VI Beta Download Spreads Malware
Bitdefender researchers found suspicious Facebook ads promoting fake beta versions for free download on PC. These ads ...
MSPs & MSSPs: How to Increase Engagement with Your Cybersecurity Clients Through vCISO Reporting
As a vCISO, you are responsible for your client’s cybersecurity strategy and risk governance. This incorporates ...