Akamai researchers recently discovered a new PayPal phishing kit that is capable of stealing your identity and allows its operators to perform any fraudulent action they desire in your name. A Very Dangerous And Capable PayPal Phishing Kit By slightly altering the...
The Nerbian RAT (remote access trojan) is a novel malware with tons of features and evasion techniques to help it go unnoticed. The sneaky trojan uses COVID-19 lures, and it was spotted by Proofpoint. The Nerbian RAT Spreading via Email Threat actors are distributing...
The Cobalt Mirage cybercriminal group has dealt some massive blows this year in the EU and the US, and its selection of targets is nothing short of odd compared to previous operations, researchers warn. About Cobalt Mirage The group mainly conducts cyber-espionage...
Social engineering attacks are a tactic used in the most well-known hacking attacks. It’s a research-based and persuasion-based strategy frequently at the heart of email-based spam, phishing, and spear-phishing schemes. The goal of social engineering attacks is...
Telegram refused to fix a scenario in which the flaw could be exploited, prompting a Trustwave researcher to decline a bug bounty and instead publicly disclose his findings. A flaw in a high-level privacy feature of Telegram on macOS that sets a...
A cyberattack happened earlier this month, on 9th July, when a security researcher found that a never-before-seen wiper malware dubbed Meteor was used in the cyberattack on Iran’s railway system, which delayed rail operations and insulted Iran’s...
Recent Comments