Email:

Phone No.

Whatsapp

Category: Cybersecurity (General)

Threat Actors Offer Millions for Zero-days, Developers Talk of Exploit-as-a-Service
Threat Actors Offer Millions for Zero-days, Developers Talk of Exploit-as-a-Service
Threat Actors Offer Millions for Zero-days, Developers Talk of Exploit-as-a-Service
Threat Actors Offer Millions for Zero-days, Developers Talk of Exploit-as-a-Service

Threat Actors Offer Millions for Zero-days, Developers Talk of Exploit-as-a-Service

Threat Actors Offer Millions for Zero-days, Developers Talk of Exploit-as-a-Service While mostly hidden in private conversations, details sometimes emerge about the parallel economy of vulnerability exploits on underground forums, revealing just how fat of a wallet some threat actors have. Some adversaries claim multi-million U.S. dollar budgets for acquiring zero-day exploits but those that don’t

Here are the New Emotet Spam Campaigns Hitting Mailboxes Worldwide

Here are the New Emotet Spam Campaigns Hitting Mailboxes Worldwide The Emotet malware kicked into action yesterday after a ten-month hiatus with multiple spam campaigns delivering malicious documents to mailboxes worldwide. Emotet is a malware infection that is distributed through spam campaigns with malicious attachments. If a user opens the attachment, malicious macros or JavaScript

WordPress Sites are Being Hacked in Fake Ransomware Attacks

WordPress Sites are Being Hacked in Fake Ransomware Attacks A new wave of attacks starting late last week has hacked close to 300 WordPress sites to display fake encryption notices, trying to trick the site owners into paying 0.1 bitcoin for restoration. These ransom demands come with a countdown timer to induce a sense of

NPM Fixes Private Package Names Leak, Serious Authorization Bug

NPM Fixes Private Package Names Leak, Serious Authorization Bug The largest software registry of Node.js packages, npm, has disclosed multiple security flaws that were identified and remedied recently. The first flaw concerns leak of names of private npm packages on the npmjs.com’s ‘replica’ server—feeds from which are consumed by third-party services. Whereas, the second flaw allows attackers to publish

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

KEEP IN TOUCH

Subscribe to our mailing list to get free tips on Data Protection and Cybersecurity updates weekly!

PDPA-1024x683-min

REPORTING DATA BREACH TO PDPC?

We have assisted numerous companies to prepare proper and accurate reports to PDPC to minimise financial penalties.
× Chat with us