Security scientists have discovered a new technique for an attack using the optical emission of a gadget LED. This technique might retrieve the sounds and eavesdrop on electronic conversations on any externally attached device. This attack can b... Read more
ReverseRAT has been significantly altered in its capabilities as a remote access Trojan utilized for executing major attacks targeting Southern and Central Asian organizations. The new variation known as ReverseRAT 2.0 is being ut... Read more
The group El Cometa, formerly SynAck, has revealed the main decryption keys for victims targeted between July 2017 and the beginning of 2021. In addition, documentation for using the master keys has been released. What transpired? The decryption... Read more
During the continuing increase in the prevalence of digital fraud on businesses and customers, the investigation by TransUnion revealed that criminals reorient their efforts from financial services to the travel, leisure, and gaming industries.... Read more
Declan Harrington from Massachusetts admitted stealing cryptocurrency from many victims and hijacking their Instagram accounts. He was charged with SIM swapping attacks two years ago, and he pleaded guilty for his crimes. As part of SIM swapping... Read more