Home

Attackers Utilize Obfuscation Tools for Multi-Stage Malware Delivery via Invoice Phishing

Cybersecurity researchers uncover a complex multi-stage attack employing invoice-themed phishing decoys to distribute various malware, including Venom RAT, Remcos RAT, XWorm, NanoCore RAT, and a crypto wallet stealer. All about [...]

Two Zero-Day Android Flaws Exploited in Google Pixel

Google has revealed the detection of two Android zero-day security vulnerabilities in its Pixel smartphones, with patches already available as per the recent Pixel Update Bulletin. Even more concerning, the [...]

New E-Shopping Attack: Hijacking Users’ Banking Credentials

Since 2021, a fake e-shop scam campaign has targeted Southeast Asia, with increased activity observed by CRIL in September 2022, expanding from Malaysia to Vietnam and Myanmar. Attackers distribute a [...]

Critical OS Command Injection Vulnerability Discovered in Progress Flowmon

Progress Flowmon is a network monitoring and security solution developed by Progress, a software company. It is designed to provide visibility into network traffic, detect anomalies, and enhance network security [...]

Hackers are exploiting YouTube channels to steal your data

Cybercriminals are exploiting YouTube, a platform adored by millions, to orchestrate advanced malware attacks. These perpetrators, capitalizing on the allure of free software and video game enhancements, prey on unsuspecting [...]

Subscribe to our newsletter to receive security tips everday!