Home

Hackers Can Use ‘App Mode’ in Chromium Browsers’ for Stealth Phishing Attacks

In what’s a new phishing technique, it has been shown that the Application Mode attribute in Chromium-primarily based web browsers can be abused to generate “real looking desktop phishing applications.” [...]

Details Released for Recently Patched new macOS Archive Utility Vulnerability

Security researchers have shared facts about a now-addressed security flaw in Apple’s macOS functioning technique that could be possibly exploited to run destructive applications in a manner that can bypass [...]

BlackByte ransomware abuses legit driver to disable security products

The BlackByte ransomware gang is using a new technique that researchers are calling “Bring Your Own Driver,” which enables bypassing protections by disabling more than 1,000 drivers used by various [...]

Experts Warn of New RatMilad Android Spyware Targeting Enterprise Devices

A novel Android malware referred to as RatMilad has been observed concentrating on a Middle Jap business cell device by concealing by itself as a VPN and phone selection spoofing [...]

Researchers Link Cheerscrypt Linux-Based Ransomware to Chinese Hackers

The recently learned Linux-Based ransomware pressure acknowledged as Cheerscrypt has been attributed to a Chinese cyber espionage team regarded for working short-lived ransomware techniques. Cybersecurity agency Sygnia attributed the assaults [...]

Subscribe to our newsletter to receive security tips everday!