Cybercriminals have come up with a new information-stealing campaign using Cisco Webex apps. Experts have uncovered this latest dubious operation. They also explained the hackers’ tactics, techniques, and procedures (TTP). These professionals used the Mitre ATT&CK framework to categorize these…
Read More
An infamous figure has claimed they have leaked the source code of three of Apple’s key internal tools. Threat actor IntelBroker announced the disturbing news. They shared the information on social media platform X via the DarkWebInformer account. The viral…
Read More
A security researcher has discovered a security vulnerability in Microsoft’s infrastructure. The bug allows hackers to imitate Microsoft corporate email accounts. This increases the risk of phishing attacks to a large degree. Security researcher Vsevolod Kokorin discovered this loophole. He…
Read More
Researchers analyzing real-world passwords leaked on the dark web had a shocking discovery. Their analysis revealed they can crack around 59% of these passwords within an hour. They can do this using a modern graphics card and a little technical…
Read More
Cybersecurity experts say there’s a campaign called “Commando Cat.” It has exploited exposed Docker remote API servers. This has resulted in the deployment of cryptocurrency miners. Cybercriminals activated the campaign early this year and it remains active. It utilizes the…
Read More