
SAVVY SEAHORSE: The Hacking Group Exploiting DNS for Investment ScamsĀ
A new cybercriminal group called “SAVVY SEAHORSE” has emerged, employing a clever technique to create numerous fake and fraudulent investment websites. By abusing DNS services…
A new cybercriminal group called “SAVVY SEAHORSE” has emerged, employing a clever technique to create numerous fake and fraudulent investment websites. By abusing DNS services…
Apple has released an important security update for iPhone, iPad and iPod touch users to address two serious vulnerabilities that were actively being exploited by…
Introduction The WordPress LiteSpeed Cache plugin, a popular tool with over five million active installations59, recently came under scrutiny due to a significant security vulnerability….
Background to PikaBot PikaBot is a type of malware that has been gaining notoriety since its emergence in early 2023124. It is a modular trojan,…
The Trustwave Spider Labs team uncovered Tycoon Group’s Phishing-as-a-Service operation, offering advanced phishing tools via Telegram. This system is designed to sidestep Microsoft’s two-factor authentication,…
In recent months, cyber security researchers have observed a worrying surge in the activities of the Anatsa banking trojan, targeting Android users across the United…
On February 8, 2024, Zoom released security updates to address a critical privilege escalation vulnerability in its software for Windows. This vulnerability could allow attackers…
On February 2024, Microsoft’s Patch Tuesday saw the release of updates addressing 73 vulnerabilities, including two critical zero-day flaws that were actively exploited. Among these…
Current cyber security incidents involving SaaS platforms, such as Midnight Blizzard targeting Microsoft and the Cloudflare-Atlassian breach, have outlined the vital significance of safeguarding personal…