Critical vulnerability in Outlook for Android affects more than 100 million users
The technology giant Microsoft recently discovered a security vulnerability that exists in its Outlook for Android app. In its security advisory, Microsoft stated that...
Gustuff-A new malware targeting android devices
According to the latest report from cybersecurity firm Group-IB, a new type of android trojan developed by Russian-based cybercriminals is spreading across global banking...
Malware turns Android devices into mobile backdoors: Report
A recent research from cybersecurity firm McAfee exposed an active phishing campaign that turns Android devices into mobile proxies. The McAfee mobile research team...
Most Android phones prone to overlay attack: Researchers
Palo Alto researchers have discovered a vulnerability that can affect all Android devices running on any version older than Oreo. The vulnerability allows the...
How to Update Web Browsers for Secure Browsing
With cybercriminals looking for innovative techniques to target vulnerable systems in the evolving digital space, securing web browsers have become more critical than ever. Outdated...
Data Privacy Week: The 3 Ps Vital to Enhancing Your Online Data Privacy
With cybersecurity awareness being a primary topic for security leaders, Data Privacy Week (January 24-28) is a good time to reflect on the importance of data...
Attackers Exploit Cloud Services to Deploy Nanocore, Netwire, and AsyncRAT
Since digitalization began, there has been a significant increase in organizations turning to cloud computing. Most companies leverage multiple cloud environments to host their...
Researchers Uncover New Malware Campaign Spreading ‘Blister’ Payload
Cybersecurity researchers from Elastic Security uncovered a new malware campaign exploiting valid code signing certificates to evade security defenses and deploy a novel malware...
New Malware Discovered With Brazil’s Itaú Unibanco Bank App
Leveraging counterfeit apps to trick users and deploy malware on the targeted devices is a common attack vector for malware authors. Security experts Cyble...
Cryptojacking Attacks Rise As Hackers Try to Exploit Linux-based Machines
Researchers at Bitdefender Security recently discovered a Romanian-based threat intelligence group hacking Linux machines and targeting systems with weak Secure Shell Protocol (SSH) credentials. The...