by

Researchers Discover Prolific Puma’s Hidden Link Shortening Operations

Prolific Puma has been stealthily operating for more than four years, serving cybercriminals engaged in phishing and malware delivery. The post Researchers...

Read More →

by

Android Device Snooping App LetMeSpy Hacked, Data of Thousands Compromised

Breached data includes email addresses, telephone numbers, and the content of messages collected on accounts. The post Android Device Snooping App LetMeSpy...

Read More →

MalwareSecurity

by

Cybersecurity Researchers Expose ‘Legitimate’ Android App as Malware

The rogue app was listed on Google’s Play Store and has affected user devices since 2021. The post Cybersecurity Researchers Expose ‘Legitimate’ Android...

Read More →

Malwarevulnerability

by

initial-scale=1 and initial-scale=1 Malware Threaten initial-scale=1 Devices

The initial-scale=1 malware is capable of impersonating entertainment, BFSI, and ecommerce apps on initial-scale=1 platforms. The post initial-scale=1 and...

Read More →

CybersecurityMalware

by

Several Prominent Organizations Fall Prey To the 3CX Attack

Researchers believe financially-motivated North Korean threat actors are behind the 3CX cascading software supply chain attack. The post Several Prominent...

Read More →

AppleMalware

by

New Report Blows the Lid on Another iPhone Spyware

The Reign spyware has audio and call recording, picture taking, location tracking, self-destruct, and other functionality. The post New Report Blows the Lid on...

Read More →

CybersecurityMalware

by

USB Charging at Public Stations Carries Serious Risk to Device Security: FBI

The Federal Bureau of Investigation has advised users to refrain from using free electric charging plugs at airports, bus stops, shopping centers, and hotels...

Read More →

by

How to Recognize and Avoid Free Gift Card Scams: 7 Warning Signs

Have you won a free gift card? The answer, of course, is “no.”...

Read More →

by

A new Android botnet trojan is out for your banking data

Staying safe online feels like it’s more challenging by the passing day, with even reputable password managers falling prey to hackers. Bad actors who...

Read More →

by

Jigsaw Ransomware: What Is It and Are You at Risk?

Ransomware attacks have caused billions of dollars in damage, and pose a huge threat to all of us. As ransomware’s usage grows, more strains of this...

Read More →

by

New HinataBot Malware Used to Launch DDoS Attacks

A new kind of botnet malware, known as HinataBot, is being used to launch DDoS attacks. The botnet may have the ability to launch DDoS attacks of 3.3 Tbps in...

Read More →

by

Fake ChatGPT Chrome Extension Steals Facebook Logins

A malicious Chrome extension using ChatGPT’s name is being used to steal users’ Facebook logins for malicious advertising....

Read More →

Close Search Window
Close