Lookalike domains are being leveraged by cybercriminals to execute cyber-attacks such as Business Email Compromise (BEC), phishing, and online fraud campaigns. Hence, researchers have recently evaluated the use of fraudulent sites by cybercrimin... Read more
With the tax season coming closer and threat actors are gearing up to take advantage of this season. One of these happens to be the Mount Locker Ransomware operators who will be targeting TurboTax returns for encryption. Relatively new ransomwar... Read more
A team of researchers has worked in tandem to convert a smart vacuum into a microphone that is capable of recording nearby conversations. Successfully tested on Xiaomi Roborock, the technique is named ‘LidarPhone’ in which the vacuum’s bui... Read more
Online banking facility users from Latin-America have been dealing with a new threat in recent times. Users of MercadoLivre – a large e-commerce platform in Latin America have been targeted by an active campaign using Chaes, a multistage i... Read more
A Chinese cyberespionage group known as Red Apollo or APT 10 has been noticed to be active again and found to be abusing the Windows Zerologon vulnerability. Some Japanese companies and subsidiaries are being targeted by this APT group. These co... Read more