Modified RAT malware and proxy networks target global victims with stealthy credential theft and advanced evasion tactics. When María López clicked to “Update Policy,” she unwittingly...
A coordinated cyberattack led by Moroccan hacker Jokeir 07x and groups Dark Hell 07x and Dr. Shell 08x compromises key Tunisian institutions, exposing government systems, banking...
Newly discovered DCHSpy malware exploits system accessibility to spy on Android users, with links to Iran’s cyber apparatus raising regional and global surveillance concerns. Iran-Linked DCHSpy...
TADTS under scrutiny for delayed breach notification as ransomware group leaks trove of sensitive personal data, igniting legal backlash and public outrage. Texas Alcohol & Drug...
As cyberattacks grow in scale and complexity, leading cybersecurity firms are turning to cutting-edge attack simulation tools like SafeBreach, XM Cyber, and CALDERA to preempt threats,...
Newly discovered CrushFTP flaw enables threat actors to bypass authentication and access sensitive files, prompting urgent calls for immediate patching and global security reviews. Hackers Exploit...
State-backed threat actors exploit two Ivanti Connect Secure vulnerabilities to breach high-value networks, steal credentials, and drop sophisticated malware—raising alarms over critical infrastructure defense worldwide. Global...
Cybercriminals are using fileless malware embedded in email chains to bypass security systems, compromising businesses and individuals across multiple sectors. “Reply Chain” Malware Attacks Infiltrate Email...
The LameHug campaign operates using a multi-stage infection chain that targets unsuspecting users via popular messaging platforms. Below is a technical breakdown of how this malware...
From smart cities to hospitals and energy grids, the integration of digital and physical systems brings efficiency—and unprecedented vulnerabilities. Experts warn Morocco and other nations must...