Cyber Attack

  1. Phishing emails impersonating purchase order are landing in user inboxes
  2. Fake emails with "exceeding storage space" alert are being circulated by hackers to steal user credentials
  3. Hackers can use your credit card without PIN authentication by exploiting an all new vulnerability
  4. Prometei is a cryptojacking botnet with capability of stealing data and mining Monero cryptominer
  5. Twitter accounts of Elon Musk, Obama, Apple, and many more hacked
  6. LG electronics targeted by Maze ransomware actors for stealing critical data
  7. 32 million users were being spied on by 70 malicious Google Chrome extensions
  8. Cyber criminals send product requirement catalogs to steal company official email passwords
  9. Vulnerability in Intel CPUs can be exploited by SGAxe and CrossTalk attacks
  10. Data of 7 million Indians leaked by mobile payment app BHIM
Back to Top