26 03, 2024

Attention Linux admins: Fake PuTTY client installing Rhadamanthys stealer detected!

By | 2024-03-26T22:11:48+05:30 March 26th, 2024|Internet Security, Linux Malware, malicious cyber actors, Malware, Mobile Security, Security Advisory, Security Update|

A malvertising campaign distributing a fake PuTTY client has been discovered, aiming to deploy the [...]

22 03, 2024

DHCP Exploited for Privilege Escalation in Windows Domains

By | 2024-03-26T05:47:40+05:30 March 22nd, 2024|BOTNET, Compromised, Exploitation, Internet Security, Mobile Security, Security Advisory, Security Update, windows|

Security researchers have discovered a sophisticated method, named "DHCP Coerce," that exploits the Dynamic Host [...]

18 03, 2024

Google Chrome will soon introduce real-time phishing protection features

By | 2024-03-19T02:54:40+05:30 March 18th, 2024|Internet Security, Malware, Mobile Security, phishing, Security Advisory, Security Update, Spam|

Google has announced an upgrade to its Safe Browsing technology, enhancing Chrome users' protection against [...]

15 03, 2024

Hackers weaponize LNK files to deploy AutoIt malware

By | 2024-03-19T03:12:14+05:30 March 15th, 2024|BOTNET, Compromised, Exploitation, malicious cyber actors, Malware, Security Advisory, Security Update|

Hackers are using weaponized LNK files to deploy AutoIt malware, causing concern in the cybersecurity [...]

13 03, 2024

PixPirate, an Android banking malware

By | 2024-03-19T03:10:27+05:30 March 13th, 2024|Android banking trojan, Android malware, BOTNET, Compromised, Exploitation, Internet Security, Malware, Mobile Security, Security Advisory, Security Update|

PixPirate, an Android banking malware, is pioneering stealth techniques to evade detection. IBM Trusteer researchers [...]

Subscribe to our newsletter to receive security tips everday!