Security researchers have discovered a straightforward method to introduce malware to a Microsoft Teams-using organization, despite the application’s limitations on
Continue readingCategory: Cyber Attack
Clop ransomware gang extorted MOVEit data-theft victims
The MOVEit data theft attacks have caused the Clop ransomware gang to start extorting businesses, first posting the names of
Continue readingAIIMS Delhi reports that a new cyberattack was stopped.
On Tuesday, a new cyberattack attempted to target the All India Institute of Medical Sciences in Delhi was stopped. The
Continue readingBotnet Malware Horabot Targets Americans: A Growing Cybersecurity concern
In recent months, a new and highly concerning cybersecurity threat has emerged, known as the botnet malware Horabot. This sophisticated
Continue readingBeware of Email Phishing: Unmasking Attackers Claiming to be Legitimate Individuals
Email phishing continues to evolve as cybercriminals become more sophisticated in their tactics. One prevalent form of email phishing involves
Continue readingProtect Yourself from Mail Phishing
In mail phishing, attackers send emails that appear to be from a reputable source such as a bank, social media
Continue readingPhishing alert: Beware of Webmail phishing
In today’s digital age, phishing attacks have become increasingly sophisticated, and one of the latest forms of phishing is webmail
Continue readingIndia’s CERT-In issues warning against ‘Royal’ ransomware targeting health and education sectors
The Indian Computer Emergency Response Team (CERT-In) recently issued a cyber alert warning against the “Royal” ransomware, which targets organizations
Continue readingIranian Hackers launch sophisticated assaults concentrated on Israel with PowerLess Backdoor
The threat of Iranian hackers targeting Israeli infrastructure and networks is a growing concern for the country’s cybersecurity. Iran is
Continue readingNew Nokoyawa Ransomware Attacks Exploiting a Windows Zero-Day Vulnerability
Exploiting a zero-day vulnerability (CVE-2023-28252) in the Windows Common Log File System, threat actors have launched new attacks to distribute
Continue reading