Apple recently launched a crucial round of Rapid Security Response (RSR) updates to mitigate a new zero-day flaw exploited in attacks and impacted fully-patched…
software development
Encrypted RPMSG Messages Exploited in Targeted Microsoft 365 Phishing Attacks
In a disturbing development, cyber attackers have devised a new method to carry out targeted phishing attacks. It is via using encrypted RPMSG attachments…
White House’s National Cybersecurity Strategy
The White House has released a new U.S. National Cybersecurity Strategy that aims to shift the burden of defending the country’s cyberspace towards software…
LastPass Data Theft in light
LastPass, a popular password management service, has revealed that it was hit by a coordinated second attack in 2022. The result was LastPass data…
KeePass vulnerabilities permit sneaky password stealing.
The KeePass development team is contesting what a recently discovered weakness that enables attackers to export the entire database in plain text covertly is.…
Cyberattack Statistics – Check Point Report
Check Point Research recently revealed new statistics regarding cyberattack in 2022. According to their findings, the number of cyberattacks in the last year was…
AIIMS Delhi services are disrupted by a cyberattack: patient data is at risk
At AIIMS Delhi cyberattack, routine tasks including scheduling appointments, registering patients, paying, and producing lab reports have all been halted by the cyberattack. According…
Numerous Cyber Attacks Using IPFS Decentralized Network Seen
The decentralized Interplanetary Filesystem (IPFS) network is being used by a variety of phishing attempts to host malware, phishing kit infrastructure, and support other…
SQLite Database Library Reported a 22-Year-Old Vulnerability
The SQLite database library has a high-severity vulnerability that was introduced as part of a code update that dates all the way back to…
A brand-new PHP malware programme targets Facebook accounts.
An unheard-of Windows information-stealing malware written in PHP that is used to steal Facebook accounts, and browser data. And cryptocurrency wallets is being disseminated…