Blogs

  1. Blue Yonder Ransomware Attack Cripples UK Grocery Supply Chains – A Wake-Up Call for Cybersecurity in Logistics
  2. Russian Hackers Unleash HATVIBE and CHERRYSPY: A New Era of Cyber Espionage Across Europe and Asia
  3. WolfsBane Malware: Chinese Hackers Shift Focus to Linux with Advanced Backdoor Attacks
  4. Ghost Tap: The Emerging NFC Exploit Fueling Global Mobile Payment Fraud
  5. Helldown Ransomware Expands to VMware and Linux: A New Threat to Critical Infrastructure
  6. Thousands of Fake Shopping Sites Launched to Steal Credit Card Data During Black Friday
  7. Ymir Ransomware: A New Breed of Memory-Based Attacks Targeting Corporate Networks
  8. Amazon Employee Data Breached in MOVEit Attack Fallout: Over 2.8 Million Records Leaked by Hackers
  9. Hackers Exploit ZIP File Concatenation Technique to Bypass Detection on Windows Machines
  10. SteelFox Malware Exploits Vulnerable Driver to Hijack Windows PCs for Crypto Mining and Data Theft
  11. Windows Server 2025 Released: Key Features and Enhancements for Businesses
  12. New Android Banking Malware 'ToxicPanda' Targets Users with Fraudulent Money Transfers
  13. Interlock Ransomware: New Threat Targets FreeBSD Servers with Double-Extortion Attacks
  14. New FakeCall Malware Hijacks Android Phones to Intercept Banking Calls and Steal Sensitive Data
  15. PSAUX Ransomware Mass Attack Exploits Critical CyberPanel Flaw, Taking Over 22,000 Servers Offline
  16. Cybercriminals Exploit Webflow to Launch Phishing Campaigns Targeting Sensitive Credentials
  17. Net Protector Wishes You a Safe, Secure, and Happy Diwali!
  18. TeamTNT Launches New Cloud Attacks on Docker for Cryptomining and Profit
  19. FortiManager Vulnerability CVE-2024-47575 Under Active Exploitation by UNC5820 Threat Group
  20. New Qilin.B Ransomware Strain Unleashes Stronger Encryption and Advanced Evasion Tactics in Latest Attacks
Page
Back to Top