Data Breach

Home/Data Breach
8 08, 2023

“Critical Remote Code Execution (RCE) Vulnerability (CVE-2023-39143) in PaperCut Application Servers”

By | 2023-08-10T07:24:57+05:30 August 8th, 2023|BOTNET, Compromised, cyberattack, Darknet, Data Breach, Evilproxy, Exploitation, infostealer, Internet Security, IOC's, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update, Tips, vulnerability|

PaperCut NG and PaperCut MF are widely adopted software solutions for managing print services on [...]

7 08, 2023

Fake VMware vConnector package detected in PyPI

By | 2023-08-14T06:54:51+05:30 August 7th, 2023|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update|

IT professionals were targeted by a malicious package named "VMConnect," which impersonated the VMware vSphere [...]

4 08, 2023

Malicious apps employ sneaky versioning techniques to evade detection by Google Play Store scanners.

By | 2023-08-14T07:00:36+05:30 August 4th, 2023|BOTNET, Compromised, Data Breach, Exploitation, Internet Security, malicious cyber actors, Malicious extension, Malware, Mobile Security, Security Advisory, Security Update|

Threat actors use versioning to bypass Google Play Store's malware detection and target Android users. [...]

1 08, 2023

Fruity Trojan: Uses deceptive software installers to spread the Remcos RAT

By | 2023-08-03T09:50:56+05:30 August 1st, 2023|Backdoor, BOTNET, Compromised, Data Breach, Exploitation, infostealer, Internet Security, Malware, Mobile Security, Security Advisory, Security Update|

Cybercriminals are fabricating counterfeit websites containing software installers that have been infected with a downloader [...]

31 07, 2023

WordPress Ninja Forms: Flaw in plugin allows data theft

By | 2023-08-01T01:39:11+05:30 July 31st, 2023|BOTNET, Compromised, Data Breach, Internet Security, Malware, Mobile Security, Security Advisory, Security Update, Tips, vulnerability, wordpress|

The renowned WordPress form plugin, Ninja Forms, has been identified to have three vulnerabilities that [...]

Subscribe to our newsletter to receive security tips everday!