Category: Attack

WoofLocker Toolkit Hides Malicious Codes in Images to Run Tech Support Scams

[ad_1] Aug 19, 2023THNMalvertising / Website Security Cybersecurity researchers have detailed an updated version of…

Thousands of Android Malware Apps Using Stealthy APK Compression to Evade Detection

[ad_1] Aug 19, 2023THNMobile Security / Malware Threat actors are using Android Package (APK) files…

New Juniper Junos OS Flaws Expose Devices to Remote Attacks

[ad_1] Aug 19, 2023THNNetwork Security / Vulnerability Networking hardware company Juniper Networks has released an…

New Wave of Attack Campaign Targeting Zimbra Email Users for Credential Theft

[ad_1] Aug 18, 2023THNEmail Seucrity / Cyber Attack A new "mass-spreading" social engineering campaign is…

Lessons from the Storm 0558 Hack

[ad_1] While IT security managers in companies and public administrations rely on the concept of…

14 Suspected Cybercriminals Arrested Across Africa in Coordinated Crackdown

[ad_1] Aug 18, 2023THNCyber Crime / Hacking News A coordinated law enforcement operation across 25…

New BlackCat Ransomware Variant Adopts Advanced Impacket and RemCom Tools

[ad_1] Microsoft on Thursday disclosed that it found a new version of the BlackCat ransomware…

Google Chrome’s New Feature Alerts Users About Auto-Removal of Malicious Extensions

[ad_1] Aug 18, 2023THNBrowser Security / Malware Google has announced plans to add a new…

New Apple iOS 16 Exploit Enables Stealthy Cellular Access Under Fake Airplane Mode

[ad_1] Aug 17, 2023THNMobile Security / Vulnerability Cybersecurity researchers have documented a novel post-exploit persistence…

Sneaky Privilege Escalation Method Bypasses Windows Security

[ad_1] Aug 17, 2023THNEndpoint Security / Vulnerability A previously undetected attack method called NoFilter has…