DECEMBER 9, 2022
InsightsSecurity

Keep children safe from cyberthreats

In the dynamic and ever-evolving landscape of the digital realm, children are stepping into the online world at an increasingly tender age, armed with smartphones and tablets as their passports to a virtual universe. However, with...

InsightsSecurity

“Beware: AndroxGh0st Botnet Strikes! Feds Issue Alert as Cyber Threat Targets AWS, Azure, and Office 365 Credentials.”

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a warning about the AndroxGh0st malware, which is being employed by threat actors to build a dangerous botn...

InsightsSecurity

Crypto Crime Coup: 29-Year-Old Ukrainian Mastermind Nabbed in Epic Takedown for Exploiting Cloud Services in Cryptojacking Spree!

“Ukrainian Wunderkind’s Crypto Crime Spree Unveiled: 29-Year-Old Whizkid Nabs $2 Million in Epic Cloud Heist! Europol and Cyber Police Join Forces for Showdown in Mykolaiv” “In a blockbuster arrest, a 29-ye...

InsightsSecurity

A malware strain is employing a Google MultiLogin exploit to retain access even after a password reset.

Malware is exploiting an undocumented Google OAuth endpoint called MultiLogin, allowing attackers to maintain access to Google services even after a password reset. The exploit, revealed by a threat actor named PRISMA and incorpor...

NewsSecurity

Google has settled a $5 billion privacy lawsuit related to tracking users in ‘Incognito Mode.’

Google has agreed to settle a lawsuit filed in June 2020, accusing the company of misleading users about privacy when using the “incognito” or “private” mode in web browsers. The class-action lawsuit sought...

InsightsSecurity

Iranian hackers are employing a tool called MuddyC2Go in espionage attacks on telecom networks across Africa.

The Iranian nation-state actor, MuddyWater, has been using a new command-and-control (C2) framework called MuddyC2Go in cyber espionage attacks on the telecommunications sector in Egypt, Sudan, and Tanzania. The activity, also tra...

InsightsSecurity

Fake Microsoft Word documents are being used to distribute dangerous Nim-based malware

A recent phishing campaign is employing decoy Microsoft Word documents to deliver a backdoor written in the Nim programming language. Nim-based malware is less common, putting security experts at a disadvantage due to their unfami...

InsightsSecurity

“Unsecure WordPress Plugin Risks Credit Card Info on E-Commerce Sites”

Beware of a malicious 'WordPress Cache Addons' plugin disguising itself as a tool while injecting harmful JavaScript to steal credit card data. Learn about Magecart campaigns targeting e-commerce sites, WebSocket skimmer attacks o...

Security

JavaScript Malware Hits 50K Users Across Global Banks

A new JavaScript malware has been discovered, targeting over 40 global financial institutions and affecting around 50,000 users. The malware uses web injections to steal online banking credentials and is suspected to be delivered ...





whatApp channel


wingu store
wingu store