The mode of delivery is always varied and updated by cybercriminals to lure their victims. Recently, a new method of phishing was discovered to lure innocent victims. Google drive scams were seen being executed by hackers with an added layer of... Read more
According to research by a team at Concordia University in Montreal, two-thirds of the vulnerabilities found in container images can be eliminated by regularly updating software components, while minimizing the number of libraries can also reduc... Read more
Following the efforts of the defenders of our sacred cyberspace that have been targeting the Trickbot’s command and control servers, the malware’s operations are on the brink of completely shutting down. Its operators were undaunted by the initi... Read more
Researchers have recently built a report based on interviews conducted with business and cybersecurity leaders from large enterprises across the world, that sheds light on why technology vendors are not incentivized to deliver products that are... Read more
Public cloud infrastructure has become cybercriminals’ one of the favorite attack surfaces, due to the convergence of technology and tech-enabled devices. Researchers have recently warned about a minimum of three massive phishing campaigns targe... Read more