This WhatsApp Call Forwarding Trick Allows Hackers To Hijack Your Account
As we all know each WhatsApp account is tied to a phone number, and hackers are calling these phone numbers directly and employing social engineering techniques to trick victims into [...]
Qbot malware now uses windows MSDT Zer0-Day in phishing attacks
In phishing assaults, the Qbot malware now uses the Windows MSDT zero-day. A serious Windows zero-day vulnerability known as Follina is currently being actively exploited in continuing phishing campaigns to [...]
DeadBolt Ransomware Locks Out Vendors With Multitiered Extortion Scheme
The number of DeadBolt-infected devices is considerably high for a ransomware family that is exclusively targeting NAS devices.The goal of DeadBolt actors is to infect as many victims as possible [...]
LuoYu APT delivers WinDealer malware via man-on-the-side attacks
LuoYu, a Chinese-speaking hacking group, is infecting victims with the WinDealer information stealer that installs backdoors to maintain persistence. The stealer performs man-on-the-side attacks. WinDealer A malicious Windows tool named [...]
Unpatched Atlassian Confluence vulnerability is actively exploited
Researchers found a vulnerability in Atlassian Confluence by conducting an incident response investigation. Atlassian rates the severity level of this vulnerability as critical. Atlassian has issued a security advisory and is working on [...]





Get Social