News

A newly discovered FileFix social engineering attack impersonates Meta account suspension warnings to trick users into ...
Many of these aren't obscure developer features or complex system administration tools. The reality is that Windows provides ...
Scripting is often seen as something only IT admins do to lengthen their coffee breaks, but home users can benefit from command line automation, too. Here are 10 PowerShell commands you can use to ...
Hackers are posing as Meta to trick users with fake suspension emails. The new FileFix attack spreads StealC malware, ...
IntroductionAPT37 (also known as ScarCruft, Ruby Sleet, and Velvet Chollima) is a North Korean-aligned threat actor active since at least 2012. APT37 primarily targets South Korean individuals ...
TL;DR Why Discord appeals to attackers Discord has become an attractive tool for attackers not because it’s malicious, but ...
Cybercriminals abuse trusted Intel driver to gain kernel access and shut down Windows Defender, enabling undetected malware deployment since July 2025.
A suspected Chinese cybercrime group is deploying custom malware to compromise Windows servers in Brazil, Thailand, Portugal ...
AttackIQ has updated the assessment template that emulates the various post-compromise Tactics, Techniques, and Procedures ...
The browser is now the frontline for cyberattacks. From phishing kits and ClickFix lures to malicious OAuth apps and ...
AI understands behaviours and turns them into patterns for precise identification and detection, enhancing endpoint security ...
Browser-based attacks exploiting OAuth flaws, MFA gaps, and malicious extensions drive large-scale data breaches.