Scammers Succeed with Online Dating Verification Apps that are Fake
Cybercriminals are preying on individuals’ concerns about online dating by coaxing them into downloading fake “verification” apps…
Cybercriminals are preying on individuals’ concerns about online dating by coaxing them into downloading fake “verification” apps…
Many Organizations Remain Vulnerable to Cactus Ransomware Exploiting Qlik Sense Vulnerabilities Nearly five months after security researchers…
A new Android banking trojan called Brokewell has been discovered by security researchers, capable of capturing every…
Autodesk Hosting Malicious PDF Files Leading to Phishing Attacks on Microsoft Credentials An elaborate phishing campaign has…
New Evasion Techniques Used by Threat Actors to Deliver Malicious Payloads Threat actors have been found employing…
Security Vulnerabilities Found in Popular Location-Tracking App A recent discovery by a security researcher has highlighted concerning…
The Treasury Department’s Office of Foreign Assets Control (OFAC) has sanctioned four Iranian nationals for their involvement…
The Cybersecurity and Infrastructure Security Agency (CISA) is working towards a September 30 deadline to provide federal…
A surge in attacks from operators of the Androxgh0st malware family has been discovered by Veriti Research,…
A recently discovered flaw in the Forminator plugin is putting hundreds of thousands of WordPress sites at…
Middle East Government Entities Targeted in New Cyber Espionage Campaign A recent report by Russian cybersecurity company…