Top

LATEST PUBLICATIONS



Threat Actors Use Telegram to Spread ‘Eternity’ Malware-as-a-Service

May 13, 2022

Category: Cyber-crime, Malware

Cybercriminals are promoting a new, modular malware-as-a-service offering that allows would-be attackers to choose from a cornucopia of threats via a Telegram channel that to date has more than 500 subscribers, researchers have found. The new malware service, dubbed the […]


3 Reasons Why Cloud Contact Centres Are the Next Step in Customer Success

April 25, 2022

Category: Editorial

At the same time that the implications of the global pandemic have created difficulties for many, they have also sparked an opportunity for growth and change.  One key area that has continued to evolve even as we return to a […]


Ransomware plagues finance sector as cyberattacks get more complex

April 20, 2022

Ransomware plagues financial institutions as they face increasingly complex threats over previous years owing to the changing behavior of cybercriminal cartels, according to VMware’s latest Modern Bank Heists report. This has happened as the cybercrime cartels have evolved beyond wire […]


Threats & Malware, Vulnerabilities

Large-Scale Attack Targeting Tatsu Builder WordPress Plugin

May 18, 2022

Via: Security Week

Tracked as CVE-2021-25094 (CVSS score of 8.1), the vulnerability exists because one of the supported actions does not require authentication when uploading a zip file that is extracted under the WordPress upload directory. While the plugin includes an extension control, […]


Cyber warfare, Cyber-crime

Russian Conti Ransomware Gang Threatens to Overthrow New Costa Rican Government

May 17, 2022

Via: The Hacker News

The notorious Conti ransomware gang, which last month staged an attack on Costa Rican administrative systems, has threatened to “overthrow” the new government of the country. “We are determined to overthrow the government by means of a cyber attack, we […]


Mobile, Mobile security

Over 200 Apps on Play Store Caught Spying on Android Users Using Facestealer

May 17, 2022

Via: The Hacker News

More than 200 Android apps masquerading as fitness, photo editing, and puzzle apps have been observed distributing spyware called Facestealer to siphon user credentials and other valuable information. “Similar to Joker, another piece of mobile malware, Facestealer changes its code […]


Threats & Malware, Vulnerabilities

Apple Finally Patches Exploited Vulnerabilities in macOS Big Sur, Catalina

May 17, 2022

Via: Security Week

The exploited vulnerabilities, tracked as CVE-2022-22675 and CVE-2022-22674, were disclosed in late March. However, at the time, they were only patched in iOS, iPadOS and macOS Monterey, leaving Big Sur and Catalina users exposed. Apple has now patched CVE-2022-22675 with […]