EvilProxy can bypass the dual authentication
The new Phishing as a Service is called EvilProxy to conduct advanced attacks with extreme ease.The kit sells for $400…
The new Phishing as a Service is called EvilProxy to conduct advanced attacks with extreme ease.The kit sells for $400…
Increasingly established in the cyber criminal market are new generations of CaaS, Crimeware as a Service, platforms, true “services” designed…
Once again, a zero-day vulnerability was fixed in the Microsoft Support Diagnostics Tool (MSDT), a service built into Windows. Like…
There are as many as 3,200 mobile apps that expose developers’ Twitter account login credentials to the public: cyber crime…
The Lockbit ransomware group, one of the most prolific in the second quarter of this year, is exploiting new exploit…
In recent weeks, the NCSC (National Cyber Security Center) has seen an huge increase in reports of suspicious entries in…
Twitter has lost a large amount of data from its user accounts-the cause is allegedly due to the exploitation of…
Google provides several updates for Android: the cumulative package of updates that fixes 29 vulnerabilities identified in the various software…
A criminal phone phishing fraud is spreading on TikTok with all the virality of a prank: an automated answering machine…
A new criminal operation called 0mega has appeared: it uses ransomware with the double extortion technique and has a website…