Hunt Researchers Expose Tools Targeting Taiwanese Infrastructure
Hunt team exposed a web server targeting Taiwan’s government infrastructure. Tools like Nmap, SQLMap, and BlueShell were utilized by the…
Hackers Target Windows Machines with New Data-Stealing Malware
Fickle Stealer targets Windows machines to steal sensitive data. It uses Rust and sophisticated anti-detection techniques. Advanced security measures are…
Fortra Reveals Security Flaw in FileCatalyst Software
Fortra discloses a vulnerability in FileCatalyst TransferAgent. Hard-coded password flaw can lead to severe security breaches. Users advised to upgrade…
Hackers Target macOS Users with Weaponized Meeting Software
Cybersecurity experts uncover a sophisticated attack on macOS users. Vortax meeting software used to distribute potent malware. Organizations urged to…
Hackers Exploit QR Code Phishing in Weaponized Word Docs
Hackers use weaponized Word docs with malicious macros and QR codes. QR code phishing attacks increased by 22% from late…
IntelBroker Leaks Apple’s Internal Tools, Raises Security Alarms
IntelBroker claims leak of Apple's internal tools. Leak includes software development and testing tools. Security experts warn of potential sophisticated…
Google Chrome Update Patches Severe Security Vulnerabilities
Google released a critical Chrome security update addressing six high-severity vulnerabilities. The update affects versions 126.0.6478.114/115 for Windows and Mac,…
Rogue Raticate Strikes Again with Malicious PDFs
Rogue Raticate targets enterprises with malicious PDFs. Symantec implements measures to protect against these threats. User vigilance is crucial in…
AI Browser Extension Detects Phishing Sites with High Accuracy
AI browser extension detects phishing sites with high accuracy. Machine learning improves real-time identification of zero-day attacks. New model outperforms…
Hackers Exploit Windows BitLocker in New Ransomware Attack
ShrinkLocker ransomware uses Windows BitLocker to encrypt files. It disables recovery keys and displays the attacker's email for ransom. Recommendations…