Experts spotted threat actors exploiting the critical vulnerability CVE-2024-0769 affects all D-Link DIR-859 WiFi routers. Researchers from...
Vous n'êtes pas connecté
Threat Actors Use Obscure or Self-Made Link Shortener Services for Credential Harvesting Earlier this month our expert takedown team responded to a bad actor that used link shortener services to obfuscate a link to a phishing page that impersonated one…
Experts spotted threat actors exploiting the critical vulnerability CVE-2024-0769 affects all D-Link DIR-859 WiFi routers. Researchers from...
A suspected Chinese threat actor tracked as UNC3886 uses publicly available open-source rootkits named 'Reptile' and 'Medusa' to remain hidden on...
Cybersecurity researchers have shed light on a new phishing campaign that has been identified as targeting people in Pakistan using a custom backdoor....
A threat actor compromised Ethereum's mailing list provider and sent to over 35,000 addresses a phishing email with a link to a malicious site running...
Nollywood actor, Nosa Rex has has warned people against using fame to create enemies on social media. In a post shared on his Instagram page, Nosa Rex...
A threat actor has claimed to have discovered a vulnerability that bypasses the two-factor authentication (2FA) on the HackerOne bug bounty platform....
Energy Harvesting is a green technology that captures (or "harvests") wasted energy and converts it into electricity. The ubiquitous vibrations that...
The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain...
The company “identified a security incident that involved bad actors targeting a limited number of HubSpot customers and attempting to gain...
Microsoft details Skeleton Key, a new jailbreak technique in which a threat actor can convince an AI model to ignore its built-in safeguards and...