A new malware dubbed “S1deLoad” has been identified by cybersecurity researchers, which infects users’ devices by taking advantage of legitimate software updates. The malware has been responsible for delivering banking Trojans, ransomware,…
Tag: intelligence
ScrubCrypt Crypter Used in Malvertising Campaigns
A new type of crypter called ScrubCrypt has been discovered by security researchers. ScrubCrypt is being used by threat actors in malvertising campaigns to evade detection by antivirus software. The crypter is…
Critical Flaw Found in FortiOS and FortiGate VPNs
A new critical vulnerability has been discovered in FortiOS and FortiGate VPNs that could allow an attacker to gain access to sensitive information and take control of affected systems. The vulnerability, tracked…
CISA Warns of Active Exploitation of Critical Infrastructure Systems
CISA Warns of Active Exploitation of Critical Infrastructure SystemsThe US Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning regarding the active exploitation of critical infrastructure systems. The advisory indicates that…
Law Firms Face Increased Cyberattacks
Law firms are increasingly becoming targets for cybercriminals, who are looking to steal confidential information and use it for financial gain or extortion. These attacks are carried out through various tactics such…
Critical Flaw in Cisco IP Phone Series
A critical vulnerability has been discovered in the Cisco IP Phone Series that could allow attackers to remotely execute code and gain full control of the affected device. The vulnerability, tracked as…
Global Firms Face Rising Cyber Threats
According to a new survey by the cybersecurity firm Sophos, 32% of global companies are expected to experience a cybersecurity attack in 2022. The report, which surveyed over 5,400 IT decision-makers in…
Security Flaw in US Federal Government’s Email System Puts Sensitive Information at Risk
A security flaw has been found in the US federal government’s secure email system, which could enable hackers to intercept and read sensitive information. The issue relates to the encryption protocol used…