î ‚Apr 08, 2024î „NewsroomCybercrime / Network Security Threat hunters have discovered a new malware called Latrodectus that has been distributed as...
Category: Attack
î ‚Apr 08, 2024î „NewsroomCybersecurity / Malvertising A new phishing campaign has set its eyes on the Latin American region to deliver malicious pa...
î ‚Apr 08, 2024î „NewsroomInvestment Scam / Mobile Security Google has filed a lawsuit against two app developers for engaging in an "international ...
î ‚Apr 06, 2024î „NewsroomSkimmer / Threat Intelligence Threat actors have been found exploiting a critical flaw in Magento to inject a persistent b...
î ‚Apr 05, 2024î „NewsroomArtificial Intelligence / Supply Chain Attack New research has found that artificial intelligence (AI)-as-a-service provid...
Compliance requirements are meant to increase cybersecurity transparency and accountability. As cyber threats increase, so do the number of comp...
î ‚Apr 05, 2024î „NewsroomMalware / Endpoint Security Bogus installers for Adobe Acrobat Reader are being used to distribute a new multi-functional ...
î ‚Apr 05, 2024î „NewsroomAdvanced Persistent Threat Multiple China-nexus threat actors have been linked to the zero-day exploitation of three secur...
î ‚Apr 05, 2024î „NewsroomCyber Espionage / Cybersecurity Financial organizations in the Asia-Pacific (APAC) and Middle East and North Africa (MENA)...
î ‚Apr 04, 2024î „NewsroomPhishing Attack / Malware An updated version of an information-stealing malware called Rhadamanthys is being used in phish...
