Latest Articles
North Korea is Attacking American Targets with Malware Through a Windows Update Service
The infamous hacking collective dubbed "Lazarus Group" has launched a new digital attack campaign. The hackers' latest attack uses Windows Update to transmit a harmful payload, bolstering LotL through an APT group to advance its overarching aims.
Google Chrome Browser Compromised by Chaes Banking Trojan
A trojan referred to as Chaes is infiltrating Google Chrome browsers. The banking trojan hijacks the web browser through extensions.
What is a Vishing Attack and How to Avoid It?
Hackers and scammers are crafty; they're always coming up with new ways of tricking people into divulging personal information.
What is a Botnet Attack?
Cyber-attacks are increasingly common and change rapidly as technology evolves and scammers become savvier. A botnet attack is a serious security threat, and individual and business networks can be targeted.
What is a Keylogger: How Attackers Can Monitor Everything You Type
Keyloggers are spyware applications that record and monitor user keystrokes, capturing every website URL, log-in name, password, social media username, and more that you type.
Polkit Flaw Allows Unprivileged to Obtain Root Access in Linux
The failure to address a digital security vulnerability in the Linux operating systems is causing significant problems. This system weakness is more than a decade old.
Watering-Hole Attacks Transmit DazzleSpy Backdoor to macOS
Hackers are using a unique backdoor to compromise Apple's macOS operating system. The backdoor infection occurs through specialized watering-hole cyber-attacks.
Ransom Cartel Version of REvil Ransomware Identified
It appears a modification of REvil ransomware is wreaking havoc in the form of Ransomware Cartel. Despite the attack's moniker, digital security specialists believe the ransomware stems from a group as opposed to a cartel.
Chinese Hackers are Using a new UEFI Firmware Called MoonBounce
Hackers based in China are implementing a new targeted digital attack using UEFI firmware implants. The attack stems from the Wintti advanced persistent threat group known as APT41.
Personal Information of More Than Half a Million at Risk After Red Cross Cyber-Attack
A cyber-attack levied on the Red Cross has jeopardized the highly sensitive personal information of 515,000 individuals. The organization has requested that the digital attackers not leak, sell, or share the information plucked from its database.
A Look at FIN8 Hackers’ White Rabbit Ransomware
The hacking collective known as FIN8 appears to be using a new form of ransomware referred to as White Rabbit. Here is a quick look at the new form of ransomware and an explanation as to why it is emerging as a major digital security hurdle.
VPNLab Shut Down by Europol
Cyber miscreants' preferred VPN service, VPNLab. net, has been shut down. Europol put the kibosh on VPNLab earlier this week.