Cybersecurity Blog
Fraudsters Make $50,000 a Day by Spoofing Crypto Researchers
Scammers are exploiting the trust placed in reputable accounts by creating fake accounts with similar names and ...
Zero-Day Flaw in Zimbra Email Software Exploited by Four Hacker Groups
Nov 16, 2023NewsroomVulnerability / Email Security A zero-day flaw in the Zimbra Collaboration email software was ...
The ALPHV/BlackCat Ransomware Gang is Using Google Ads to Conduct…
Security researchers with eSentire, a top global cybersecurity solutions provider, are warning that Russian-speaking ...
US Agencies Warn of Opportunistic Rhysida Ransomware Attacks
The Rhysida attackers exploit vulnerabilities like the lack of Multi-Factor Authentication (MFA) and the Zerologon ...
Hackers Claim Major Data Breach at Smart WiFi Provider Plume
An X (Twitter) account, operated by hackers using the handle @MonkeyInject, alleges that the breach was facilitated by a ...
Experts Uncover DarkCasino: New Emerging APT Threat Exploiting WinRAR Flaw
Nov 16, 2023NewsroomAdvanced Persistent Threat / Zero-Day A hacking group that leveraged a recently disclosed security ...
State-Backed Hackers a Threat to Australia, Agency Warns
Australia faces a “persistent threat” from state-backed hackers, the country’s signals intelligence agency said ...
Samsung Hit by New Data Breach Impacting UK Online Store Customers
The breach was caused by a hacker exploiting a vulnerability in a third-party application. Customer information such as ...