Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars From Customers

Hackers Created 100+ Fake Web Stores To Steal Millions Of Dollars

Fake web stores are fraudulent websites created by threat actors to mislead consumers into providing "personal information" and making purchases for "non-existent products." These...
Vulnerabilities WebRTC Implementations

Vulnerabilities In WebRTC Implementations Let Attackers Trigger DoS Attacks

WebRTC (Web Real-Time Communication) is an open-source project that facilitates real-time audio, video, and data sharing directly between web browsers and mobile applications without...
Researcher Exploited CI / CD Pipelines To Gain Full Server Access

Researcher Exploited CI / CD Pipelines To Gain Full Server Access

A CI/CD pipeline is a series of automated steps that helps software teams deliver code faster, safer, and more reliably.  It coordinates all the processes...
Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

Beware Of Malicious Chrome Extension That Delivers Weaponized ZIP Archive

Malicious Chrome extensions pose significant risks to users, as they can compromise personal information, inject unwanted promotions, and even manipulate web traffic as well. There...
Understanding The Different Types Of SSL Certificates

Understanding The Different Types Of SSL Certificates

As of January 2024, over 302 million SSL certificates had been issued online. Secure Sockets Layer (SSL) is a security protocol which authenticates and...
Okta Browser Plugin Vulnerable To Reflected Cross-Site Scripting Attacks

Okta Browser Plugin Vulnerable To Reflected Cross-Site Scripting Attacks

Okta Browser Plugin is available on multiple browsers like Edge, Chrome, Safari, and Firefox. Combining all these browsers, the plugin has over 5 million...
Hackers Abuse Swap File In Shopping Sites To Inject Persistent Credit Card Skimmer

Hackers Abuse Swap File In Shopping Sites To Inject Credit Card Skimmer

Since the Swap file stores data that the system's RAM cannot hold, these contents often contain critical data like passwords, encryption keys, and session...
New Skimmer Malware Attacking E-commerce WebSites To Steal Credit Card Data

New Skimmer Malware Attacking E-commerce WebSites To Steal Credit Card Data

Researchers identified a new variant of credit card skimming attack, the Caesar Cipher Skimmer, targeting multiple content management systems (CMS), including WordPress, Magento, and...
3 Security Trends for MSP’s: Must-Watch Free Webinar to Help MSPs Win Big

3 Security Trends for MSP’s: Must-Watch Free Webinar to Help MSPs Win Big

MSP leaders are advised to save the date for June 27. In a special session, called “3 Security Trends to Maximize MSP Growth” and...
Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution

Hackers Employ JavaScript Framework To Trick Users Copy, Paste And Command Execution

Hackers use JavaScript frameworks since they offer a wide range of functionalities and tools that could be used to bypass detection, hide code, and...

Recent Posts

CyTwist Launches Advanced Security Solution to identify AI-Driven Cyber Threats in...

CyTwist, a leader in advanced next-generation threat detection solutions, has launched its patented detection engine to combat the insidious rise of AI-generated malware. The cybersecurity...