News

VirusTotal has discovered a phishing campaign hidden in SVG files that create convincing portals impersonating Colombia's ...
APK fraud is one of the fastest-growing cybercrime threats in the country today. These scams, driven by malicious Android ...
APT28 deploys NotDoor Outlook backdoor via OneDrive DLL side-loading, enabling email-based data theft in NATO firms.
Explore Docker Wine, a unique solution for running Windows applications on Linux using containerization. Learn how it offers ...
Bad actors are using GitHub's repository structure and paid Google Ads placements to trick EU IT users into downloading a unique malware dubbed "GPUGate" that includes new hardware-specific evasion ...
Arctic Wolf examines Interlock’s most common attack methods and provides tips on how to protect your organisation.
If the storage space on the C drive is running low, every free gigabyte counts. Windows often occupies more than 25 GB of ...
Threat actors have been using multiple websites promoted through Google ads to distribute a convincing PDF editing app that ...
Income Tax Return: Filing income tax returns (ITR) is a crucial financial task every year. It is not just a legal obligation but also an important part of handling your finances. For salaried ...
Everyone has to deal with File Explorer. It is, after all, the Windows feature you use to get around the file system, organize data, copy and move folders, access external drives, and more. Over the ...
IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...