Multiple researchers have voiced their concerns regarding the expansions of banking Trojans playing field to non-financial apps. And their concerns unfurled into reality when something similar happened with this new malware which expanded its sc... Read more
With work from home becoming the new normal, corporate, schools and families have opted for various video conferencing applications to conduct their meetings and for staying in touch. With the growing popularity of video conferencing platforms,... Read more
A new attack that lets malicious threat actors modify the content of digitally signed PDF documents have rendered Fifteen out of 28 desktop PDF viewer applications as vulnerable to exploitation. According to new research published by academics f... Read more
To lure victims into various scams using fake or hacked accounts of high-profile celebrities and brands has always been an old trait of cybercriminals. But this time, a massive coordinated attack that was executed on the Twitter accounts could b... Read more
While the modern-day digital ecosystem supports considerable security controls such as encryption, identification, and authentication, however, this has not always been the case. During the initial development and deployment of the early Interne... Read more