Cyber Attacks

Hackers Exploiting HTML Functions to Bypass Email Secur...

Cybercriminals increasingly leverage sophisticated HTML techniques to circumvent...

Uncovering Attacker’s Infrastructure & Tactics Via Pass...

In the ever-evolving landscape of cybersecurity, understanding how attackers est...

Uncovering Attacker’s Infrastructre & Tactics Via Passi...

In the ever-evolving landscape of cybersecurity, understanding how attackers est...

Hackers Attacking Sporting Events Via Fake Domains To S...

Cybercriminals leverage high-profile events, such as global sporting championshi...

Hackers Attacking Global Sporting Championships Via Fak...

Cybercriminals leverage high-profile events, such as global sporting championshi...

New QR Code-Based C2 Attack Lets Hackers Bypass All Typ...

Cybersecurity firm Mandiant has uncovered a novel method to bypass browser isola...

Chinese Salt Typhoon Hacked 8+ Telecoms To Stole U.S. C...

A Chinese hacking campaign, codenamed “Salt Typhoon” by Microsoft, has infiltrat...

Isreali NSO Group’s Pegasus Spyware Detected in New Mob...

Cybersecurity researchers from iVerify have revealed widespread new infections o...

Deloitte Hacked – Brain Cipher Ransomware Group Alleged...

Notorious ransomware group Brain Cipher has claimed to have breacked Deloitte UK...

Deloitte Hacked – Brain Cipher Ransomware Group Claims ...

Notorious ransomware group Brain Cipher has claimed to have breacked Deloitte UK...

AWS Launched New Security Incident Response Service to ...

Amazon Web Services (AWS) unveiled a new service, AWS Security Incident Response...

Microsoft Ignite 2024 live : Highlights From Threat Int...

AI transformation starts with security. This theme echoed throughout Microsoft I...

Linux Kernel 6.13 Released – Avoiding Holiday Season Clash

In a rare occurrence, the Linux kernel development cycle has aligned favorably w...

North Korean Hacking Group Launches Undected Malwareles...

Researchers from South Korea have discovered that the notorious North Korean hac...

Weekly Cybersecurity Newsletter: Data Breaches, Vulnera...

Welcome to this week’s Cybersecurity Newsletter, where we delve into the latest ...

InputSnatch – A Side-Channel Attack Allow Attackers Ste...

In a recent study, cybersecurity researchers have unveiled a new side-channel at...