Microsoft recently released an update that fixed a serious security weakness in Windows shortcut files, also known as .LNK files, which hackers have been exploiting for years. These shortcut files are the small icons you click to open programs or folders in Windows, but the flaw allowed attackers to hide dangerous commands inside them without […]
U.S. cybersecurity officials recently warned that hacking groups linked to the Chinese government have been using a sophisticated type of malware to secretly stay inside important computer systems across the country. This malware acts like a hidden doorway that lets attackers slip in and out of networks without being noticed. Once installed, it gives the […]
A group of hackers recently created more than 4,300 fake travel-booking websites designed to trick hotel guests into giving up their payment card information. These bogus sites pretend to be well-known services like hotel-booking or rental platforms, complete with familiar brand logos and professional-looking layouts — making them seem real at first glance. The scam […]
A new wave of cyberattacks has been discovered — hackers are using a serious weakness in Windows Server Update Services (WSUS) to secretly install ShadowPad, a powerful malware, and take full control of the affected servers. The flaw lets attackers break in remotely — without needing anyone to click a link or open a file. […]
A hacking group known as ToddyCat has created new tools designed to steal information from businesses by targeting their computers and email systems. Instead of trying to break into email accounts from the outside, the group focuses on compromising the devices where messages and data are stored. Once they gain access, they can quietly collect […]
A serious new security flaw has been uncovered in VMware software, and reports show that hackers linked to China have been quietly using it since October of last year. This issue affects several VMware products used by businesses around the world, including tools for managing virtual machines and cloud platforms. What’s the Problem? The flaw […]
Mexican President Claudia Sheinbaum has confirmed that her personal phone and an old email account were recently compromised in a sophisticated cyberattack. Speaking at her daily press conference, Sheinbaum assured the public that the compromised phone is no longer used for personal communication, serving instead as a channel for connecting with supporters. She also emphasized […]
Indonesia’s national data center has fallen victim to a significant cyber attack, with hackers demanding an $8 million ransom to restore full system functionality. The attack, which began last Thursday, has disrupted services for over 200 government agencies at both national and regional levels, according to Samuel Abrijani Pangerapan, the Director General of Informatics Applications […]
The Source of the Disruption: CrowdStrike The core of this extensive disruption was traced back to CrowdStrike, a cybersecurity firm that supplies software to numerous companies globally. The company revealed that the issue stemmed from a faulty update deployed to computers running Microsoft Windows. CrowdStrike emphasized that this was not a security breach or cyberattack […]
Have you ever encountered a website that looks nearly identical to a popular one you know, but something seems slightly off? You might have stumbled upon an example of typosquatting. Typosquatting involves creating websites with names that closely resemble well-known brands, often by introducing a minor error or using similar-looking characters. While it may sound […]
- 1
- 2





