Cyber Attack

Hackers Weaponizing Shortcut Files With Zero-day Tricks To Attack Windows Users

Hackers weaponize shortcut files because they are an inconspicuous way to execute malicious code on a target system.  These files…

2 days ago

Fujitsu Cyber Attack: Customers’ Personal Information Exposed

Fujitsu Limited has disclosed the results of an investigation into a cyberattack that potentially exposed customers' personal information. The breach,…

3 days ago

Kimsuky Hackers Attacking Organizations Using Weaponized EXE & DOCX Files

Hackers often use EXE and DOCX file formats is due to they are among the most commonly used types of…

4 days ago

Teamviewer Discloses Investigation Update Following Cyber Attack

TeamViewer, the global leader in remote connectivity solutions, has provided an update on the cyber attack detected on June 26,…

1 week ago

Team ARXU Hackers Aggressively Attacking Schools And Bank Servers

Hackers frequently target schools and bank servers to obtain important personal information, including financial data, that can be used for…

1 week ago

Hackers Using ProxyLogon & ProxyShell To Attack Microsoft Exchange Servers

Hackers attack Microsoft Exchange servers because they often contain sensitive communication data that can be exploited for several illicit purposes.…

1 week ago

New SnailLoad Side-Channel Attack Let Hackers Monitor Your Web Activity

Hackers often monitor web activities to gather several types of confidential data. By tracking your online activities, hackers can tailor…

1 week ago

New Volcano Demon Ransomware Group Threatening Victims Over Phone Call

A novel malware known as Volcano Demon has been observed targeting Windows workstations and servers, obtaining administrative credentials from the…

1 week ago

Hackers Breaking Passkeys Using AitM Phishing Attacks

Hackers abuse phishing attacks as they are highly effective and low-cost methods for deceiving users into revealing sensitive information. Despite…

1 week ago

Xctdoor Malware Attacking IIS Servers To Distribute Malware

Threat actors target IIS servers, as most of the internet-based crucial applications and services are installed on these servers. Hackers…

2 weeks ago