Hackers Steal Cryptocurrency Worth $150 Mn From BitMart Exchange
The evolution of cryptocurrencies has attracted cybercriminal groups globally. Cryptocurrency exchanges and hot wallets continue to become a primary target for threat actors. The...
NHS U.K. Warns About Fake Omicron PCR Test Alerts
Just when the world is trying to come to terms with the challenges unleashed by the COVID-19 virus, we have another variant, Omicron. Threat...
Finland Warns About ‘Flubot’ Malware Spread Via SMS
FluBot – an infamous banking malware that affected thousands of users across Australia and the U.K. – is now active in Finland.
In an official...
Threat Actors Leverage Smishing to Target Iran Citizens
Security researchers from Check Point found ongoing malware campaigns targeting Iran citizens. The campaign reportedly uses socially engineered SMS messages to infect tens of...
Vulnerabilities in MediaTek Chips Found in 37% of Smartphones Worldwide
Security experts from Check Point discovered multiple security flaws in smartphone chips developed by MediaTek, which could have led attackers to spy on Android...
Apple Files Lawsuit Against NSO Group for State-sponsored Surveillance
Israel’s cyber intelligence and surveillance company NSO Group is once again in a legal row.
On November 23, 2021, Apple stated that the company has...
Microsoft September 2021 Patch Tuesday: Mitigations and Workarounds
Microsoft released fixes for 60 security vulnerabilities in its latest September 2021 Patch Tuesday update. Out of 60 vulnerabilities, 56 were determined as important,...
61 Mn Fitness Tracking Records Leaked via Unsecured GetHealth Database
The rise of IoT devices in the health care sector led to various potential cyber risks. The usage of wearable devices like fitness bands...
Hackers Use SSID Stripping to Trick Users Into Joining Rogue APs
With the evolution of new threat actors and their latest attack vectors, the cyberthreat landscape is larger than expected. Security experts from AirEye recently...
What is Man-in-the-Middle Attack and How to Prevent them
Man-in-the-middle (MITM) attacks are gaining importance in the cyberattack landscape as threat actor groups are leveraging it more often to harvest users’ sensitive data...