Cryptocurrency Investment Scams
In recent years, cryptocurrency has seen a massive rise in attention and interest and, for the majority, acts as a legitimate method of payment or…
In recent years, cryptocurrency has seen a massive rise in attention and interest and, for the majority, acts as a legitimate method of payment or…
Researchers at a cyber security firm Resecurity have released a report outlining a new Phishing-as-a-service (PhaaS) platform advertised on the dark web. Named EvilProxy, the service allows…
Researchers at Check Point Research have uncovered malware disguised as multiple legitimate apps, including Google Translate and YouTube Music for Desktop. If downloaded, the malware waits for…
Phishing attacks are one of the most common methods threat actors use to gain access to your network and devices. If you have an email…
Researchers at Mitiga, a cyber security incident response company, have uncovered threat actors targeting senior leaders, such as CEOs and CFOs, with specially crafted spear…
Description: The number of phishing attacks using legitimate software-as-a-service (SaaS) platforms has risen by 1100% since June 2021, according to a report published by Palo Alto Networks…
Apple has released security updates for a zero-day vulnerability that affects both the kernel and WebKit (Apple’s web browser engine that powers Safari) iOS devices and could…
Affected Systems: Networking devices containing Realtek’s RTL819x system on a chip. Description: Researchers from Faraday Security, a cyber security company based in Argentina, have released exploit…
Description: Microsoft’s Threat Intelligence Centre (MSTIC) has published the technical methods and activities relating to a Russian group tracked as SEABORGIUM. The blog details how the threat…