Non Fungible Tokens

Non Fungible Tokens

NFTs represent an entry on the blockchain certifying that someone owns a particular digital asset.The concept might seem inherently abstract, it boils down to this: being able to claim sole…
APT Hits FortiOS

APT Hits FortiOS

The FBI and the CISA are warning that APT nation-state actors are actively exploiting known security vulnerabilities in the Fortinet FortiOS cybersecurity operating system, affecting the company’s SSL VPN products.…

Limitation Googledroid

Apps on Android have been able to infer the presence of specific apps, or even collect the full list of installed apps on the device. Apart from all the usual…
Hades Ransomware

Hades Ransomware

Hades ransomware has lately been in the daily news and created devastation in its wake. And,Hafnium too known from the most recent attacks on Microsoft Exchange Servers. The scoop Researchers…
Phishing BazarCall

Phishing BazarCall

Online researchers are documenting a new malware campaign that they've named "BazarCall." One of its primary malware "payloads" is the BazarLoader remote-access Trojan, which can give a hacker full authority…
Fake Sec Firm 🤡

Fake Sec Firm 🤡

A North Korean government-backed campaign targeting cybersecurity researchers with malware has re-emerged with new tactics in their arsenal as part of a fresh social engineering attack. Google's Threat Analysis Group…