Business Email Compromise Attacks Increase During Summer
Business Email Compromise (BEC) poses a significant security and financial threat to businesses worldwide. In a recent announcement, the FBI revealed that BEC attacks have…
Business Email Compromise (BEC) poses a significant security and financial threat to businesses worldwide. In a recent announcement, the FBI revealed that BEC attacks have…
Description: The revolutionary technology of GenAI tools, such as ChatGPT, has brought significant risks to organisations’ sensitive data, new research by browser security company LayerX highlights these…
Description Software development relies on powerful tools like Microsoft Visual Studio, an Integrated Development Environment (IDE) that facilitates coding and collaboration. However, it’s crucial to…
Description The malicious spyware module is disguised as a developer tool and has infiltrated countless Android apps and games on the Google Play store. Operating…
Description In targeted phishing attacks that bypass email security gateways, attackers employ encrypted RPMSG attachments sent through compromised Microsoft 365 accounts to steal Microsoft credentials….
Description: Researchers at Proofpoint have discovered various ways cybercriminals can use Microsoft Teams to trick people or infect their computers with harmful software. They found…
Description: A new phishing-as-a-service (PaaS) tool named “Greatness” is exclusively targeting companies in the UK, US, Canada, Australia, and South Africa, with Microsoft 365 phishing…
Affected Devices: TBK DVR4104 and TBK DVR4216, and rebrands of these models sold under the Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night…
Researchers at Zero Day Initiative have published an article detailing their detection of the Mirai botnet exploiting a high-severity vulnerability found in TP-Link Archer AX21 Wi-Fi routers….