This is how the new Emotet spam email looks like
The operators of the dangerous Emotet malware attacked again after almost a year of inactivity, this time in the form of a spam campaign that aims to deliver malicious filesRead More →
Data Security News | Infosec Blog | Information Security Tutorials
The operators of the dangerous Emotet malware attacked again after almost a year of inactivity, this time in the form of a spam campaign that aims to deliver malicious filesRead More →
Recent research details a method to exploit a security flaw in the Amazon Web Services (AWS) API Gateway through an HTTP header smuggling attack. Pentesting specialist Daniel Thatcher, in chargeRead More →
Cybersecurity specialists described a new method to hide backdoors hidden in JavaScript thanks to the use of Unicode characters that are invisible or can be easily confused with other characters.Read More →
According to a report by Trend Micro, the hacking group identified as TeamTNT has been attacking Docker servers with exposed REST APIs as part of an ambitious exploitation campaign, resortingRead More →
The U.S. Department of State announced that it is offering a reward of up to $10 million USD to anyone who provides information that leads to the identification and arrestRead More →
Backups can help you recover your data after a system failure, natural disaster, or a ransomware attack. When thinking about a recovery method, keep in mind the effectiveness of aRead More →
In hundreds of criminal investigation cases, authorities are always looking for information available from all sorts of sources, from oral testimony, evidence, and even posts and activity on social mediaRead More →
Cybersecurity specialists from Abnormal Security report the detection of at least 200 malicious emails as part of a phishing campaign targeting Microsoft Office 365 users. Apparently, the primary goal ofRead More →
In December 2020, several U.S. states filed a lawsuit against Google for engaging in alleged anti-competitive practices in the field of digital advertising. One of the main arguments of theRead More →
Cybercriminals are always looking for new ways to deceive their victims and would not hesitate for a second to test them, even at the cost of investing large amounts ofRead More →