Hackers target poorly secured Microsoft SQL and MySQL database servers to deploy the Gh0stCringe remote access trojans on vulnerable devices….
Blog
The U.S. Cybersecurity & Infrastructure Security Agency (CISA) has added fifteen additional flaws to its list of actively exploited vulnerabilities…
The ransomware space was very active in the last quarter of 2021, with threat analysts observing 722 distinct attacks deploying…
Security researchers tracking the mobile app ecosystem have noticed a recent spike in trojan infiltration on the Google Play Store,…
Taiwanese hardware vendor QNAP warns most of its Network Attached Storage (NAS) devices are impacted by a high severity Linux…
Mobile security company Zimperium has released its annual mobile threat report where security trends and discoveries in the year that…
The Aberebot Android banking trojan has returned under the name ‘Escobar’ with new features, including stealing Google Authenticator multi-factor authentication…
Imagine that you’re sitting at the dinner table, and your phone suddenly comes alive with debit alert after debit alert….
A notorious botnet with a RAP sheet going back 15 years has been spotted using a novel attack technique. Qakbot, also…
The rise of online trading platforms has made it easier than ever to invest in the stock market, forex or…