![Cyber Alert](https://cyberfraudcentre.com/wp-content/uploads/2023/02/Blog-Thumbnails-33-576x324.png)
Hackers Abusing Windows Search to Spread Malware
Cyber security researchers at SOCRadar and Trellix have recently uncovered a new method hackers are using to spread malware on Windows computers. This method takes…
Cyber security researchers at SOCRadar and Trellix have recently uncovered a new method hackers are using to spread malware on Windows computers. This method takes…
The widely used WordPress form-building plugin, Ninja Forms, has been found to harbour three vulnerabilities. These security flaws could enable attackers to perform privilege escalation…
Ivanti released a patch for a critical vulnerability in Ivanti Endpoint Manager Mobile (EPMM), formerly MobileIron Core. The vulnerability, CVE-2023-35078, allows unauthorised access to potentially…
The trojan malware known as LokiBot or Loki PWS has been identified as a significant threat primarily targeting Windows operating systems. Recent reports indicate that…
Description Card testing attacks, also known as card checking attacks, are a form of fraud where criminals try to determine if stolen credit card information…
Description The Akira ransomware group, a relatively new player in the cybercriminal landscape, is quickly gaining momentum and expanding its reach. Recent findings suggest that…
Business Email Compromise (BEC) poses a significant security and financial threat to businesses worldwide. In a recent announcement, the FBI revealed that BEC attacks have…
Description: The revolutionary technology of GenAI tools, such as ChatGPT, has brought significant risks to organisations’ sensitive data, new research by browser security company LayerX highlights these…
Description Software development relies on powerful tools like Microsoft Visual Studio, an Integrated Development Environment (IDE) that facilitates coding and collaboration. However, it’s crucial to…