Blogs
-
The nation’s official cyber security agency has issued a new advisory warning of the existence of the Internet ransomware virus
-
Posted: July 18, 2023Views: 35Microsoft is looking into a persistent Exchange Online outage that prevents users from sending emails and results in 503 errors
-
Posted: July 07, 2023Categories: Ransomware, Security, Malware Alerts, Cyber Attack, Data Backup, Data Breach, vulnerability, HackerViews: 29With over 1.5 million installations combined, two malicious file management apps were identified by security experts on Google Play. These
-
Posted: June 23, 2023Views: 25Security researchers have discovered a straightforward method to introduce malware to a Microsoft Teams-using organization, despite the application’s
-
Posted: June 20, 2023Views: 22Since April 2023, a brand-new information-stealing malware known as “Mystic Stealer” has been advertised on hacking forums and darknet markets,
-
Posted: June 16, 2023Categories: Events and News, Cyber Attack, Data Breach, Phishing, Browser Hijack, Hacker, Cloud SecurityViews: 33The MOVEit data theft attacks have caused the Clop ransomware gang to start extorting businesses, first posting the names of
-
The Enlisted multiplayer first-person shooter is the target of a ransomware operation that spreads trojanized versions of the game t
-
On Tuesday, a new cyberattack attempted to target the All India Institute of Medical Sciences in Delhi was stopped. The
-
Posted: June 03, 2023Views: 36In recent months, a new and highly concerning cybersecurity threat has emerged, known as the botnet malware Horabot. This sophisticated
-
Posted: May 17, 2023Views: 15Email phishing continues to evolve as cybercriminals become more sophisticated in their tactics. One prevalent form of email phishing involves
-
In mail phishing, attackers send emails that appear to be from a reputable source such as a bank, social media
-
In today’s digital age, phishing attacks have become increasingly sophisticated, and one of the latest forms of phishing is webmail
-
Posted: May 05, 2023Views: 28The Indian Computer Emergency Response Team (CERT-In) recently issued a cyber alert warning against the “Royal” ransomware, which targets organizations
-
The threat of Iranian hackers targeting Israeli infrastructure and networks is a growing concern for the country’s cybersecurity. Iran is
-
Recently, it was reported that Goldoson malware has infected 60 apps on the Google Play Store, which have been downloaded
-
Exploiting a zero-day vulnerability (CVE-2023-28252) in the Windows Common Log File System, threat actors have launched new attacks to distribute
-
Hackers use the email that contains unsolicited messages or instructions that imitate actual email from legitimate sources such as DHL
-
In April 2023, we are seeing an increase in the number of fake virus alerts being circulated to users on
-
In today’s digital age, it’s not uncommon to receive emails that claim to have detected threats to your security or
-
Posted: March 13, 2023Views: 21Phishing emails can appear to be legitimate messages from a trustworthy source, such as a bank, social media site, or