A threat actor group known by the name Lazarus, who is believed to have links with the Democratic People’s Republic of Korea, has targeted at ...
By
Get ready for a digital thief who is sneaking behind and waiting for the right time to attack. This time, it has used malicious code ...
By
It is like seeing with the eyes of imagination, a bomb that counts down time in silence and waits in the open to explode. The ...
By
A recently discovered critical vulnerability of Apache Struts has been found to be under active exploitation. The flaw covered under CVE-2024-53677 carries a CVSS ...
By
Shocking new revelations have emerged in the wake of the 2022 LastPass breach, as a sly hacker unleashes a series of cyber attacks using stolen ...
By
Popular PHP-based frameworks like Laravel and ThinkPHP have been found to be targeted by a new backdoor named Glutton. The targets have been in regions ...
By
Imagine a world where cyber criminals wield the same technological prowess as the companies they are trying to scam. Unfortunately, this is not a futuristic ...
By
A shocking phenomenon has emerged where cybercriminals are manipulating unsuspecting traders in Peer-to-Peer (P2P) transactions, siphoning off stolen funds through a complex web of deceit. ...
By
A ransomware group that identifies itself as Brain Cipher has made a data breach claim involving Deloitte UK through a post. The hackers have ...
By
Security experts at Lookout have found a sophisticated spyware named EagleMsgSpy. This mobile spyware system helps Chinese police agencies collect data from phones. The Android ...
By