In the ever-expanding realm of cyber warfare, a shadowy player has emerged: “Mysterious Team Bangladesh.” This enigmatic group has been
Continue readingCategory: Data Breach
Google Play apps with 1.5 million downloads expose your information to China
With over 1.5 million installations combined, two malicious file management apps were identified by security experts on Google Play. These
Continue readingA flaw in Microsoft Teams makes it possible for external accounts to distribute malware
Security researchers have discovered a straightforward method to introduce malware to a Microsoft Teams-using organization, despite the application’s limitations on
Continue readingIncreasing numbers of assaults use new Mystic Stealer malware
Since April 2023, a brand-new information-stealing malware known as “Mystic Stealer” has been advertised on hacking forums and darknet markets,
Continue readingClop ransomware gang extorted MOVEit data-theft victims
The MOVEit data theft attacks have caused the Clop ransomware gang to start extorting businesses, first posting the names of
Continue readingBotnet Malware Horabot Targets Americans: A Growing Cybersecurity concern
In recent months, a new and highly concerning cybersecurity threat has emerged, known as the botnet malware Horabot. This sophisticated
Continue readingPhishing alert: Beware of Webmail phishing
In today’s digital age, phishing attacks have become increasingly sophisticated, and one of the latest forms of phishing is webmail
Continue readingIranian Hackers launch sophisticated assaults concentrated on Israel with PowerLess Backdoor
The threat of Iranian hackers targeting Israeli infrastructure and networks is a growing concern for the country’s cybersecurity. Iran is
Continue readingPhishing attack: Beware of fake DHL Express emails
Hackers use the email that contains unsolicited messages or instructions that imitate actual email from legitimate sources such as DHL
Continue readingData security concern: Beware of scareware emails and know how to handle them.
In today’s digital age, it’s not uncommon to receive emails that claim to have detected threats to your security or
Continue reading