Email:

Phone No.

Whatsapp

Blog

Scammers Promote Fake Cryptocurrency Giveaways Via Twitter Ads
Scammers Promote Fake Cryptocurrency Giveaways Via Twitter Ads
Scammers Promote Fake Cryptocurrency Giveaways Via Twitter Ads
Scammers Promote Fake Cryptocurrency Giveaways Via Twitter Ads

Scammers Promote Fake Cryptocurrency Giveaways Via Twitter Ads

Scammers Promote Fake Cryptocurrency Giveaways Via Twitter Ads Threat actors have started to use ‘Promoted’ tweets, otherwise known as Twitter ads, to spread cryptocurrency giveaway scams. For some time, BleepingComputer has been reporting on scammers hacking into verified Twitter accounts to promote fake cryptocurrency giveaway scams. These scams pretend to be from well-known people or

Google Shares Spectre PoC Targeting Browser JavaScript Engines

Google Shares Spectre PoC Targeting Browser JavaScript Engines Google has published JavaScript proof-of-concept (PoC) code to demonstrate the practicality of using Spectre exploits targeting web browsers to access information from a browser’s memory. According to the Google Security Team, the PoC shared today works across a wide range of processor architectures, operating systems, and hardware

Microsoft Exchange Exploits Now Used By Cryptomining Malware

Microsoft Exchange Exploits Now Used By Cryptomining Malware The operators of Lemon_Duck, a cryptomining botnet that targets enterprise networks, are now using Microsoft Exchange ProxyLogon exploits in attacks against unpatched servers. The malware is known for installing XMRig Monero (XMR) CPU coinminers on infected devices to mine cryptocurrency for the botnet’s owners. Lemon_Duck’s ongoing attacks

Researchers Hacked Indian Govt Sites Via Exposed Git And Env Files

Researchers Hacked Indian Govt Sites Via Exposed Git And Env Files Researchers have now disclosed more information on how they were able to breach multiple websites of the Indian government. Last month, researchers from the Sakura Samurai hacking group had partially disclosed that they had breached cyber systems of Indian government after finding a large number of critical vulnerabilities. The

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us