4 03, 2024

SMS Bombing: The Risks and Dangers of Text Message Attacks

By | 2024-03-04T07:24:19+05:30 March 4th, 2024|BOTNET, Compromised, Evilproxy, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, Tips|

In the realm of cybersecurity, SMS Bomber attacks are emerging as a modern threat with [...]

4 03, 2024

Beware: Business Email Compromise (BEC) Attacks Threaten Organizations

By | 2024-03-04T07:24:33+05:30 March 4th, 2024|BOTNET, Compromised, Exploitation, Internet Security, malicious cyber actors, Mobile Security, phishing, Security Advisory, Security Update, Spam, Tips|

The pandemic has spurred significant shifts in business models. With the rise of digital transformation, [...]

1 03, 2024

New Bifrost malware for Linux mimics VMware domain for evasion

By | 2024-03-04T05:17:04+05:30 March 1st, 2024|BOTNET, Compromised, Exploitation, Linux Malware, malicious cyber actors, Malware, Regulation, Security Advisory, Security Update, Tips, VMware|

A new Linux variant of Bifrost, called Bifrose, was detected employing a clever evasion tactic [...]

29 02, 2024

Hackers Exploit SVG Image Files for GUloader Malware Distribution

By | 2024-03-01T23:10:31+05:30 February 29th, 2024|Compromised, Darknet, Exploitation, hackers, Internet Security, IOC's, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

Cybercriminals are leveraging the flexibility of SVG (Scalable Vector Graphics) files for the dissemination of [...]

29 02, 2024

Cybercriminals Exploit Weaponized ZIP Files to Acquire NTLM Hashes

By | 2024-03-01T23:10:53+05:30 February 29th, 2024|BOTNET, Compromised, Exploitation, hackers, Internet Security, malicious cyber actors, Mobile Security, Security Advisory, Security Update|

Cyber adversaries utilize ZIP files as a means to weaponize them, leveraging the ease of [...]

Subscribe to our newsletter to receive security tips everday!