Employed by several attackers, Zero-day vulnerabilities are one of the most preferred attacking techniques of several attackers these days. Zero-day vulnerabilities are actively being abused by threat actors to accomplish their goals ranging fro... Read more
Since the start of the pandemic, cybercriminals have feasted on the end-users lack of awareness, not only about the pandemic itself but about cybersecurity as well. And now with the start of the New Year, COVID-19 themed cyberattacks are turning... Read more
As a significant source of threat and monetary income, shady ad practices offer cybercriminals various ways to lure technologically challenged mobile users. The attack vector is seeing a potential role in technical support scams using browser lo... Read more
Researchers have discovered the malware that was to inject backdoors in Orion platform builds during the supply-chain attack that led to the compromise of several companies and government agencies by the SolarWinds hackers. Attackers dropped the... Read more
According to a recent security alert released by the Federal Bureau of Investigation (FBI) warning private sectors, since its first appearance in September 2020, Egregor ransomware has now compromised more than 150 victims. By using several mech... Read more