Evasive phishing mixes reverse tunnels and URL shortening services
Security researchers are seeing an uptick in the use of reverse tunnel services along with URL shorteners for large-scale phishing campaigns,…
Security researchers are seeing an uptick in the use of reverse tunnel services along with URL shorteners for large-scale phishing campaigns,…
Security researchers are warning of an Android malware named SMSFactory that adds unwanted costs to the phone bill by subscribing victims…
The U.S. Department of Justice (DOJ) recently revised its policy on charging violations of the Computer Fraud and Abuse Act…
An remote code execution (RCE) vulnerability in all versions of the popular Confluence collaboration platform can be abused in credential…
The Evil Corp cybercrime group has now switched to deploying LockBit ransomware on targets' networks to evade sanctions imposed by…
A Chinese-speaking hacking group known as LuoYu is infecting victims WinDealer information stealer malware deployed by switching legitimate app updates with malicious payloads in…
Threat analysts have discovered a large operation of a new cryptocurrency mining malware called Clipminer that brought its operators at…
Security researchers have described the malware as among the fastest-spreading mobile threats in recent years.
Chinese-linked threat actors are now actively exploiting a Microsoft Office zero-day vulnerability (known as 'Follina') to execute malicious code remotely…
"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially…