
Blog Series
Cybersecurity News
- No categories

US Elections: Iranian Hackers Target...
With elections, there have always been accusations of rigging and corruption and it’s possible that such claims may hold some truth in different countries worldwide. However, the US elections have...
Alert: Users At Risk Amid...
Recent cybersecurity research claims that a new malware campaign masking itself as the Palo Alto VPN, GlobalProtect, is now targeting users in the Middle East. It has been observed that...
Alert: Hackers Use Bogus npm...
North Korean threat actors have recently been observed publishing malicious packages to the npm registry. Reports claim that these acts now indicate unified efforts pertaining to developers being targeted with...
Cobalt Strike Attack: Threat Actors...
In the cybercrime landscape, Chinese users have been targeted with a new Cobalt Strike attack. Unidentified threat actors behind the campaign leverage phishing email for infecting Windows systems with the...
Velvet Ant Exploits Cisco Zero-Day...
In light of recent cybercrime events, details pertaining to the Cisco zero-day flaw that has now been patched have emerged. As per the details, the flaw, if exploited, could allow...
Moscow Hacker Extradited To US...
As per recent reports, a Moscow hacker has been charged in the US on various accounts of cybercrime. Charges leveled against the hacker include allegedly stealing data, extorting victims, and...
Cthulhu Stealer: New macOS Malware...
As per recent reports, a new macOS malware, dubbed the Cthulhu stealer, has been discovered by cybersecurity researchers. The information stealer is designed to target macOS hosts and is capable...
Qilin Ransomware Attack Used To...
In the cyberthreat landscape, Qilin ransomware attack has recently been observed stealing credentials in Chrome browsers. Reports claim that these credentials are being acquired using a small set of compromised...
PEAKLIGHT Dropper: Hackers Target Windows...
Cybersecurity researchers have recently discovered an unprecedented dropper. Being dubbed the PEAKLIGHT dropper, it’s used to launch malware capable of infecting Windows systems. Reports claim that such infections lead to...
Google Pixel Security: Android App...
In jointly published analysis by Palantir Technologies and Trail of Bits pertaining to Google Pixel security, it has been revealed that Pixel phones shipped worldwide since 2017 host a dormant...
SolarWinds Patches: Severe Web Help...
In light of recent cybersecurity events, a critical SolarWinds Web Help Desk vulnerability has been revealed. Although SolarWinds patches pertaining to the vulnerability have been released, if it were to...