An international law enforcement operation codenamed ‘Operation Passionflower’ has shut down MATRIX, an encrypted messaging platform used by cybercriminals to coordinate illegal activities while evading police. […] Go to Source Author: Bill Toulas
Category Archives: Security
The holiday season brings tons of opportunities for retailers to thrive, but it also opens the door to increased cyber risks. With so many people shopping and transactions spiking, cybercriminals see this period as a perfect chance to strike. From sneaky phishing attempts to full-blown ransomware attacks, your business could be at risk. But don’t […]
The holiday season brings plenty of joy and increased sales, but with all this activity comes a heightened risk of cyberattacks. With more transactions happening than usual, cybercriminals see the holidays as the perfect time to launch attacks. From phishing emails to ransomware and bots, the threats are real and can be costly for your […]
The holiday season is exciting for retailers, bringing a surge in customers and sales. However, with this increase comes a heightened risk of cyberattacks. Hackers know that businesses are busy and distracted during this time, making it the ideal moment to strike. From ransomware to phishing schemes, cybercriminals have a range of tactics to exploit […]
South Korean police have arrested a CEO and five employees for manufacturing over 240,000 satellite receivers pre-loaded or later updated to include DDoS attack functionality at a purchaser’s request. […] Go to Source Author: Bill Toulas
Russian authorities have sentenced the leader of the criminal group behind the now-closed dark web platform Hydra Market to life in prison. […] Go to Source Author: Sergiu Gatlan
The recently uncovered ‘Bootkitty’ UEFI bootkit, the first malware of its kind targeting Linux systems, exploits CVE-2023-40238, aka ‘LogoFAIL,’ to infect computers running on a vulnerable UEFI firmware. […] Go to Source Author: Bill Toulas
A novel phishing attack abuses Microsoft’s Word file recovery feature by sending corrupted Word documents as email attachments, allowing them to bypass security software due to their damaged state but still be recoverable by the application. […] Go to Source Author: Lawrence Abrams
A new set of 15 SpyLoan apps with over 8 million installs was discovered on Google Play, targeting primarily users from South America, Southeast Asia, and Africa. […] Go to Source Author: Bill Toulas
A new phishing-as-a-service (PhaaS) platform named ‘Rockstar 2FA’ has emerged, facilitating large-scale adversary-in-the-middle (AiTM) attacks to steal Microsoft 365 credentials. […] Go to Source Author: Bill Toulas



