Since April 2023, a brand-new information-stealing malware known as “Mystic Stealer” has been advertised on hacking forums and darknet markets,
Continue readingCategory: Phishing
Clop ransomware gang extorted MOVEit data-theft victims
The MOVEit data theft attacks have caused the Clop ransomware gang to start extorting businesses, first posting the names of
Continue readingBeware of Email Phishing: Unmasking Attackers Claiming to be Legitimate Individuals
Email phishing continues to evolve as cybercriminals become more sophisticated in their tactics. One prevalent form of email phishing involves
Continue readingProtect Yourself from Mail Phishing
In mail phishing, attackers send emails that appear to be from a reputable source such as a bank, social media
Continue readingPhishing alert: Beware of Webmail phishing
In today’s digital age, phishing attacks have become increasingly sophisticated, and one of the latest forms of phishing is webmail
Continue readingIndia’s CERT-In issues warning against ‘Royal’ ransomware targeting health and education sectors
The Indian Computer Emergency Response Team (CERT-In) recently issued a cyber alert warning against the “Royal” ransomware, which targets organizations
Continue readingIranian Hackers launch sophisticated assaults concentrated on Israel with PowerLess Backdoor
The threat of Iranian hackers targeting Israeli infrastructure and networks is a growing concern for the country’s cybersecurity. Iran is
Continue readingGoldoson Malware Strikes Again: Infecting Android Apps on the Google Play Store
Recently, it was reported that Goldoson malware has infected 60 apps on the Google Play Store, which have been downloaded
Continue readingNew Nokoyawa Ransomware Attacks Exploiting a Windows Zero-Day Vulnerability
Exploiting a zero-day vulnerability (CVE-2023-28252) in the Windows Common Log File System, threat actors have launched new attacks to distribute
Continue readingPhishing attack: Beware of fake DHL Express emails
Hackers use the email that contains unsolicited messages or instructions that imitate actual email from legitimate sources such as DHL
Continue reading