How to remove ransomware: Best free decryption tools and resources

Ransomware refers to malicious software that encrypts all of the data in your computer’s operating system and then proceeds to demand a ransom to decrypt the encrypted data. The commonly…

Attackers Spoof WhatsApp Voice-Message Alerts to Steal Info

Threat actors target Office 365 and Google Workspace in a new campaign, which uses a legitimate domain associated with a road-safety center in Moscow to send messages. Attackers are spoofing…

This new malware targets AWS Lambda environments

A new malware variant that targets AWS Lambda has been discovered. On Wednesday, researchers from Cado Security published their findings on Denonia, malware currently being used in targeted attacks against…

Ransomware: Conti gang is still in business, despite its own massive data leak

The Conti ransomware gang is still actively running campaigns against victims around the world, despite the inner workings of the group being revealed by data leaks.  One of the most…

Microsoft: Here are the key Windows 11 security upgrades coming your way

Microsoft claims that Windows 11 will bring major security improvements and had detailed a number of them, Not many businesses are using Windows 11 right now because of the high…

Russian Darknet Marketplace Hydra Shutdown by The US DOJ

Hydra Market, one of the largest dark web marketplaces in the world, has been shut down by the US Department of Justice (DOJ). Hydra’s servers and cryptocurrency wallets holding $25…

CashApp Customers Affected by Data Breach

Developed by Block, Inc., Cash App is a mobile payment service that enables customers to send money to one another using a mobile phone application. Currently, the service is only…

VLC Media Player Leveraged by Hackers to Distribute Malware Loader

A lasting malicious campaign employed by threat actors linked to the Chinese government has been recently discovered by security experts. Its purpose is the launching of a custom malware loader…

These sneaky hackers hid inside their victims' networks for nine months

A hacking and cyber espionage operation is going after victims around the world in a widespread campaign designed to snoop on targets and steal information.  Identified victims of the cyber…

Google increases its bug bounty for Fitbit and Nest security flaws

Google has upgraded its Vulnerability Rewards Program (or VRP) with more reward payments for hackers who find bugs in its Nest devices and those from Fitbit which it bought in January…