î ‚Apr 02, 2024î „NewsroomFirmware Security / Vulnerability The malicious code inserted into the open-source library XZ Utils, a widely used package...
Category: Attack
î ‚Apr 02, 2024î „NewsroomCyber Espionage / Threat Intelligence A threat activity cluster tracked as Earth Freybug has been observed using a new mal...
Cloud solutions are more mainstream – and therefore more exposed – than ever before. In 2023 alone, a staggering 82% of data breaches were again...
î ‚Apr 02, 2024î „NewsroomBrowser Security / Data Security Google has agreed to purge billions of data records reflecting users' browsing activities...
î ‚Apr 02, 2024î „NewsroomMalvertising / Threat Intelligence The threat actor known as TA558 has been attributed to a new massive phishing campaign ...
î ‚Apr 01, 2024î „NewsroomCryptocurrency / Financial Fraud The Indian government said it has rescued and repatriated about 250 citizens in Cambodia ...
Despite a plethora of available security solutions, more and more organizations fall victim to Ransomware and other threats. These continued thr...
î ‚Apr 01, 2024î „NewsroomBotnet / Mobile Security Several malicious Android apps that turn mobile devices running the operating system into residen...
The Android banking trojan known as Vultur has resurfaced with a suite of new features and improved anti-analysis and detection evasion techniqu...
î ‚Mar 30, 2024î „NewsroomMalware / Cryptocurrency Malicious ads and bogus websites are acting as a conduit to deliver two different stealer malware...
