Latest Threats

Bogus Android Clubhouse App Drops Credential-Swiping Malware

Bogus Android Clubhouse App Drops Credential-Swiping Malware

The malicious app spreads the BlackRock malware, which steals credentials from 458...

Office 365 Phishing Attack Targets Financial Execs

Office 365 Phishing Attack Targets Financial Execs

Attackers move on new CEOs, using transition confusion to harvest Microsoft credentials.

Critical F5 BIG-IP Flaw Now Under Active Attack

Critical F5 BIG-IP Flaw Now Under Active Attack

Researchers are reporting mass scanning for – and in-the-wild exploitation of –...

Tutor LMS for WordPress Open to Info-Stealing Security Holes

Tutor LMS for WordPress Open to Info-Stealing Security...

The popular learning-management system for teacher-student communication is rife...

Security Researcher Hides ZIP, MP3 Files Inside PNG Files on Twitter

Security Researcher Hides ZIP, MP3 Files Inside PNG Files...

The newly discovered steganography method could be exploited by threat actors to...

Zoom Screen-Sharing Glitch ‘Briefly’ Leaks Sensitive Data

Zoom Screen-Sharing Glitch ‘Briefly’ Leaks Sensitive Data

A glitch in Zoom's screen-sharing feature shows parts of presenters' screens that...

Trojanized Xcode Project Slips MacOS Malware to Apple Developers

Trojanized Xcode Project Slips MacOS Malware to Apple Developers

In a new campaign, threat actors are bundling macOS malware in trojanized Apple...

Fiserv Forgets to Buy Domain It Used as System Default

Fiserv Forgets to Buy Domain It Used as System Default

Fintech security provider Fiserv acknowledges it used unregistered domain as default...

PYSA Ransomware Pillages Education Sector, Feds Warn

PYSA Ransomware Pillages Education Sector, Feds Warn

A major spike of attacks against higher ed, K-12 and seminaries in March has prompted...

A New Paradigm in Data Security: Insider Risk Management

A New Paradigm in Data Security: Insider Risk Management

Insider Risk Management builds a framework around the new paradigm of "risk tolerance,"...

State-sponsored Threat Groups Target Telcos, Steal 5G Secrets

State-sponsored Threat Groups Target Telcos, Steal 5G Secrets

Researchers say China-linked APTs lure victims with bogus Huawei career pages in...

Mimecast: SolarWinds Attackers Stole Source Code

Mimecast: SolarWinds Attackers Stole Source Code

A new Mimecast update reveals the SolarWinds hackers accessed several "limited"...

$4,000 COVID-19 ‘Relief Checks’ Cloak Dridex Malware

$4,000 COVID-19 ‘Relief Checks’ Cloak Dridex Malware

The American Rescue Act is the latest zeitgeisty lure being circulated in an email...

Top MSP Challenges in 2021

Top MSP Challenges in 2021

At SafeDNS, we see three entangled hurdles for MSPs in 2021 and the coming years—...

Google Releases Spectre PoC Exploit For Chrome

Google Releases Spectre PoC Exploit For Chrome

Google has released the side-channel exploit in hopes of motivating web-application...

Magecart Attackers Save Stolen Credit-Card Data in .JPG File

Magecart Attackers Save Stolen Credit-Card Data in .JPG...

Researchers from Sucuri discovered the tactic, which creatively hides malicious...

Exchange Cyberattacks Escalate as Microsoft Rolls One-Click Fix

Exchange Cyberattacks Escalate as Microsoft Rolls One-Click...

Public proof-of-concept (PoC) exploits for ProxyLogon could be fanning a feeding...

Latest Mirai Variant Targets SonicWall, D-Link and IoT Devices

Latest Mirai Variant Targets SonicWall, D-Link and IoT...

A new Mirai variant is targeting known flaws in D-Link, Netgear and SonicWall devices,...

Google Warns Mac, Windows Users of Chrome Zero-Day Flaw

Google Warns Mac, Windows Users of Chrome Zero-Day Flaw

The use-after-free vulnerability is the third Google Chrome zero-day flaw to be...

Cyberattacks See Fundamental Changes, A Year into COVID-19

Cyberattacks See Fundamental Changes, A Year into COVID-19

A year after COVID-19 was officially determined to be a pandemic, the methods and...

Microsoft Exchange Exploits Pave a Ransomware Path

Microsoft Exchange Exploits Pave a Ransomware Path

As attacks double every hour, hackers are exploiting vulnerable Microsoft Exchange...

Metamorfo Banking Trojan Abuses AutoHotKey to Avoid Detection

Metamorfo Banking Trojan Abuses AutoHotKey to Avoid Detection

A legitimate binary for creating shortcut keys in Windows is being used to help...

Europol Credits Sweeping Arrests to Cracked Sky ECC Comms  

Europol Credits Sweeping Arrests to Cracked Sky ECC Comms...

Sky ECC claims that cops cracked a fake version of the app being passed off by disgruntled...

REvil Group Claims Slew of Ransomware Attacks

REvil Group Claims Slew of Ransomware Attacks

The threat group behind the Sodinokibi ransomware claimed to have recently compromised...

This is not the Darkweb, so unfortunately the site uses cookies. By continuing to browse the site you are agreeing to our use of cookies Find out more here