In recent months, a new and highly concerning cybersecurity threat has emerged, known as the botnet malware Horabot. This sophisticated
Continue readingCategory: Cyber Attack
Beware of Email Phishing: Unmasking Attackers Claiming to be Legitimate Individuals
Email phishing continues to evolve as cybercriminals become more sophisticated in their tactics. One prevalent form of email phishing involves
Continue readingProtect Yourself from Mail Phishing
In mail phishing, attackers send emails that appear to be from a reputable source such as a bank, social media
Continue readingPhishing alert: Beware of Webmail phishing
In today’s digital age, phishing attacks have become increasingly sophisticated, and one of the latest forms of phishing is webmail
Continue readingIndia’s CERT-In issues warning against ‘Royal’ ransomware targeting health and education sectors
The Indian Computer Emergency Response Team (CERT-In) recently issued a cyber alert warning against the “Royal” ransomware, which targets organizations
Continue readingIranian Hackers launch sophisticated assaults concentrated on Israel with PowerLess Backdoor
The threat of Iranian hackers targeting Israeli infrastructure and networks is a growing concern for the country’s cybersecurity. Iran is
Continue readingNew Nokoyawa Ransomware Attacks Exploiting a Windows Zero-Day Vulnerability
Exploiting a zero-day vulnerability (CVE-2023-28252) in the Windows Common Log File System, threat actors have launched new attacks to distribute
Continue readingPhishing attack: Beware of fake DHL Express emails
Hackers use the email that contains unsolicited messages or instructions that imitate actual email from legitimate sources such as DHL
Continue readingFake Virus Alerts: Don’t Fall for the Scam!
In April 2023, we are seeing an increase in the number of fake virus alerts being circulated to users on
Continue readingData security concern: Beware of scareware emails and know how to handle them.
In today’s digital age, it’s not uncommon to receive emails that claim to have detected threats to your security or
Continue reading