most popular this week
Scammers Use Residential IP Addresses to Launch BEC Attacks
Business Email Compromise (BEC) attacks are continuously growing. In 2022, the FBI reported getting close to 22,000 problems, with a loss of over $2.7 billion…
New DarkCloud Campaign Leverages Spam Emails
The DarkCloud info-stealer is again in a brand new marketing campaign that's utilizing spam emails for distribution, found ASEC. Alongside DarkCloud, the risk…
Guerrilla Campaign: Lemon Group’s Business of Pre-infected Devices
A risk star obtained control over millions of smart devices dispersed around the world by means of preinstalled malware. According to Trend Micro, stars behind…
FIN7 Returns with Cl0p Ransomware Attacks
Microsoft scientists have actually found the economically inspired cybercriminal team FIN7 releasing Cl0p ransomware. This ransomware-based assault by the team is…
TurkoRAT Mimics NPM Packages to Infect Developers
Researchers discovered a set of destructive npm packages that collected over a thousand downloads by developers worldwide. The packages concerned hid an open-Keep…
Android Phones Exposed to Fingerprint Brute-Force Attacks
A just lately launched assault named ‘BrutePrint’ has been introduced by researchers from Tencent Labs and Zhejiang University. This assault technique…
Windows Kernel Drivers Used in BlackCat Attacks
The BlackCat ransomware was discovered in February, utilizing authorized harmful Windows kernel drivers to prevent discovery by safety devices. The motorist used…
Voice Cloning-as-a-Service Emerges as a New Stream in Underground World
The ever-growing growth in AI-based instruments is more and more attracting cybercriminals. Experts have noticed a rise in the supply of Voice Cloning-as-a-Service…