Home

Microsoft Word Documents Used as Lures to Distribute Nim-Based Malware

A recently identified phishing campaign is using decoy Microsoft Word documents as a lure to deploy a backdoor written in the Nim programming language. Nim-Based Malware "Malware in uncommon programming [...]

Cryptocurrency Scams on Twitter Exploit Post Features

Scammers exploit a feature of Twitter posts, deceiving users and putting digital assets at risk. This deceptive tactic relies on Twitter's URL structure, enabling hackers to entice individuals into various [...]

GOOGLE ADDRESSED A NEW ACTIVELY EXPLOITED CHROME ZERO-DAY

Google has issued emergency updates to address yet another Chrome zero-day vulnerability that has been actively exploited in the wild. This marks the eighth zero-day vulnerability patched since the beginning [...]

Microsoft Alerts of RCE and DoS Vulnerabilities in Perforce Server

In the course of a security assessment of its game development studios, Microsoft identified four vulnerabilities in Perforce Helix Core Server. These vulnerabilities have the potential to be exploited remotely [...]

Comcast’s Xfinity Breach Exposes Data of 35.8 Million Users

Comcast has officially acknowledged a significant security breach affecting its Xfinity division, with approximately 36 million customers of the world's largest telecom provider exposed due to the CitrixBleed exploitation. Hackers [...]

Subscribe to our newsletter to receive security tips everday!