Panasonic suffers a data breach when hackers breach its network
Panasonic, a Japanese consumer electronics company, has acknowledged a security incident in which an unauthorised third party gained access to its network and potentially read data from one of its file...
New Linux malware found a new place to hide itself
According to the reports of cybersecurity researchers, a new remote access trojan (RAT) for Linux has been discovered. Reportedly, the trojan holds an invisible profile by hiding itself in various tasks...
Black Friday 2021, a great opportunity for hackers to carry out their criminal activities
Black Friday just went a couple of days ago and cybercriminals had their eyes on deploying the most malicious malware, phishing lures, making fake websites, mostly to take advantage of online...
Google warned its users; cryptocurrency miners using hacked cloud accounts
Reportedly, cryptocurrency miners are using hacked cloud accounts to mine cryptocurrency.
Google cybersecurity action team published a report showing the details of the hack in which the hackers have been using compromised...
Malicious attachment might hand over your credentials to a third party
Using a new PowerShell-based stealer dubbed PowerShortShell by security experts at SafeBreach Labs, a newly found Iranian threat actor is collecting Google and Instagram credentials belonging to Farsi-speaking targets all around...
Ordered a product and not yet delivered? Here’s the FBI warning
The Federal Bureau of Investigation (FBI) warned on Wednesday that fraudsters promising deals and hard-to-find presents could cost online customers more than $53 million this holiday season.
"Over 17,000 complaints about non-delivery...
Looks like Swire Pacific Offshore didn’t patch their systems properly
After being the target of a cyber-attack, shipping major Swire Pacific Offshore (SPO) has reported a data breach.
In a press release, the Singapore-based marine organisation stated that "unauthorised access to its...
Vulnerable devices for research are being used as a bait for hackers
Researchers set up 320 honeypots to see how quickly threat actors would target open cloud services, and found that 80% of them were hacked in less than 24 hours.
Harmful actors are...
Italian threat actors manifested why we should not trust our printers
A group of Italian academics has put together a set of three attacks known as 'Printjack,' which warns users of the dangers of trusting their printer too much.
The attacks involve building...
What did the researchers found out about RatDispenser?
According to HP Threat Research, the actors behind RATDispenser may be using a Malware-as-a-Service (MaaS) architecture to transmit eight malware families.
STRAT, WSHRAT, AdWind, Formbook, Remcos, Panda Stealer, GuLoader, and Ratty are...