Cyber security news for all

More

    Malware & Threats

    New Phishing Scheme Utilizes Google Drawings and WhatsApp Shortened Links

    Cybersecurity experts have unveiled a sophisticated phishing scheme that ingeniously employs Google Drawings in tandem with shortened links generated through WhatsApp. This strategy is...

    Apple’s macOS Sequoia Fortifies Gatekeeper to Deter Unsanctioned Software

    On Tuesday, Apple unveiled an update to its forthcoming macOS Sequoia, introducing heightened restrictions that make circumventing Gatekeeper defenses more challenging for users. Gatekeeper serves...

    Google Remedies Critical Android Kernel Vulnerability Actively Exploited

    Google has rectified a severe security vulnerability within the Android kernel that has been actively leveraged in the wild. The flaw, designated CVE-2024-36971, has been...

    Kazakh Organizations Under Siege by ‘Bloody Wolf’ Cyber Attacks

    Organizations in Kazakhstan are currently under attack by a threat group known as Bloody Wolf, which is deploying a commodity malware called STRRAT (also...

    Cybercriminals Exploit Cloudflare Tunnels for Undetectable Malware Distribution

    Cybersecurity companies are raising alarms over the increasing misuse of Cloudflare's TryCloudflare free service for distributing malware. This activity, reported by eSentire and Proofpoint,...

    New Windows Backdoor BITSLOTH Utilizes BITS for Covert Communication

    Cybersecurity researchers have uncovered a previously undocumented Windows backdoor, named BITSLOTH, which exploits the Background Intelligent Transfer Service (BITS) for stealthy command-and-control (C2) communication....

    Recent Articles