Cyber Attack

  1. Telegram is being used by credit card skimmers to channel the stolen funds
  2. Phishing emails impersonating purchase order are landing in user inboxes
  3. Fake emails with "exceeding storage space" alert are being circulated by hackers to steal user credentials
  4. Hackers can use your credit card without PIN authentication by exploiting an all new vulnerability
  5. Prometei is a cryptojacking botnet with capability of stealing data and mining Monero cryptominer
  6. Twitter accounts of Elon Musk, Obama, Apple, and many more hacked
  7. LG electronics targeted by Maze ransomware actors for stealing critical data
  8. 32 million users were being spied on by 70 malicious Google Chrome extensions
  9. Cyber criminals send product requirement catalogs to steal company official email passwords
  10. Vulnerability in Intel CPUs can be exploited by SGAxe and CrossTalk attacks
Back to Top