How Typosquatting Scams Work
Your teacher was right. Spelling counts, particularly to scammers. Enter the world of typosquatting scams. Also known as URL hijacking, typosquatting scams target internet users...
Cyber-criminals Exploit GPUs in Graphic Design Software
Cisco Talos reported that the campaign has been active since at least November 2021 Read More
Agent Tesla’s Unique Approach: VBS and Steganography for Delivery and Intrusion
Authored by Yashvi Shah Agent Tesla functions as a Remote Access Trojan (RAT) and an information stealer built on the .NET framework. It is capable...
Google TAG Exposes North Korean Campaign Targeting Researchers
The team has discovered the exploitation of at least one zero-day flaw in the last few weeks Read More
Russian Man Handed Nine-Year Sentence for Hacking Scheme
Vladislav Klyushin hacked into US filing agents to discover non-public information about hundreds of companies on the US stock exchange Read More
LLMs and Tool Use
Last March, just two weeks after GPT-4 was released, researchers at Microsoft quietly announced a plan to compile millions of APIs—tools that can do everything...
AT&T Cybersecurity serves as critical first responder during attack on municipality
Earlier this year, analysts in the AT&T Cybersecurity Managed Threat Detection and Response (MTDR) security operations center (SOC) were alerted to a potential ransomware attack...
Regulator to Investigate Fertility App Security Concerns
ICO reveals over half of women are worried about their data Read More
CISA Adds Critical RocketMQ Bug to Must-Patch List
Apache flaw can enable remote command execution Read More
Apple Patches Two Zero-Days Exploited in Pegasus Attacks
Users of iOS devices urged to enable lockdown mode Read More