Home Tags Malicious actors

Tag: malicious actors

How to Know if You’re Being Stalked by Stalkerware

At a time when everyone is more connected than ever, cybercriminals too have become more active looking for ways to turn an adverse situation...

Attackers are Using Fake Office 365 Pages to Phish C-Suite Executives

Security experts from Trend Micro uncovered an ongoing phishing campaign spreading fake Office 365 password expiration reports to compromise email accounts of C-Suite executives....

TikTok Fixes Critical Vulnerability in its ‘Find Friends’ Feature

Security researchers from Check Point uncovered a critical vulnerability in TikTok’s Find Friends feature, which could have allowed threat actors to pilfer users’ phone...

Google’s Project Zero Team Details Patched Bugs in Duo, Signal, JioChat,...

Natalie Silvanovich, a security researcher at Google Project Zero, disclosed critical vulnerabilities in multiple messaging and video conferencing mobile apps that allowed malicious actors...

FireEye Releases ‘Azure AD Investigator’ to Know SolarWinds Hacking Techniques

The SolarWinds supply chain cyberattack took the digital world by storm, affecting government agencies and IT giants. To detail the techniques used by the SolarWinds threat...

Insider Threats: A Byproduct of the New Normal

Despite the continuous security improvements, the concern over insider threats seems to be growing for organizations globally. The new distributed working conditions have also...

From Data Leak to Dark Web: What Happens to Your Stolen...

There might be various cybercriminal activities operating online, but stealing users’ sensitive information and peddling it on darknet markets is the primary activity for...

Egregor Ransomware Hits HR Agency Randstad

Popular staffing company Randstad has suffered a ransomware attack in which threat actors stole unencrypted files from its network. In an official release, the...

CISA Issues Advisory on Mitigating Risks Originating from Tor

The Cybersecurity and Infrastructure Security Agency (CISA) in the U.S. issued security guidelines on how to  mitigate cyber risks  originating from anonymity networks like...

MOST POPULAR

RECENT POSTS