With work from home becoming the new normal, corporate, schools and families have opted for various video conferencing applications to conduct their meetings and for staying in touch. With the growing popularity of video conferencing platforms,... Read more
A new attack that lets malicious threat actors modify the content of digitally signed PDF documents have rendered Fifteen out of 28 desktop PDF viewer applications as vulnerable to exploitation. According to new research published by academics f... Read more
To lure victims into various scams using fake or hacked accounts of high-profile celebrities and brands has always been an old trait of cybercriminals. But this time, a massive coordinated attack that was executed on the Twitter accounts could b... Read more
While the modern-day digital ecosystem supports considerable security controls such as encryption, identification, and authentication, however, this has not always been the case. During the initial development and deployment of the early Interne... Read more
After its recent awakening, Emotet is now once again installing the TrickBot trojan on infected Windows computers and has started to send spam worldwide. After nearly five months of inactivity, Emotet botnet appears to have woken up and has... Read more