Hackers deploy weaponized PDF files to distribute Mispadu banking malware
Originally focused on Latin America, the banking trojan Mispadu has broadened its scope to Europe, employing phishing emails and malicious URLs to pilfer credentials. The attackers leverage these stolen credentials [...]
Watch out for free Android VPN apps that transform your device into proxies
Security specialists have unearthed a group of Android VPN apps that surreptitiously convert user devices into proxy nodes, possibly engaging in nefarious activities unbeknownst to users. This revelation has sparked [...]
Threat actors employ Tycoon 2FA kits to pilfer your data through deceptive login pages
Cybercriminals leverage 2FA (Two-Factor Authentication) phishing kits to bypass the added security layer provided by 2FA. These kits typically replicate genuine login interfaces and prompt users to input their credentials [...]
Attention Linux admins: Fake PuTTY client installing Rhadamanthys stealer detected!
A malvertising campaign distributing a fake PuTTY client has been discovered, aiming to deploy the dangerous Rhadamanthys stealer malware. Fake PuTTY client installing Rhadamanthys stealer This campaign cleverly exploits the [...]
Patch Now: Exploits Targeting 2 Firefox Zero-Days Unveiled at Pwn2Own
Mozilla has swiftly responded to two zero-day vulnerabilities exploited during the recent Pwn2Own Vancouver 2024 hacking contest in the Firefox web browser. During this week's Pwn2Own Vancouver 2024 hacking competition, [...]





Get Social