Qakbot Hackers Persist with Malware Distribution Despite Takedown Attempt: Despite a recent law enforcement operation aimed at disrupting the notorious Qakbot malware, cybercriminals are continuing their malicious activities. …
hackers
-
-
News
Hackers Exploiting Browser and File Transfer Tool Vulnerabilities
by CSC Newsby CSC News 3 minutes readHackers Exploiting Browser and File Transfer Tool Vulnerabilities: Government officials and cybersecurity experts have issued warnings regarding the exploitation of vulnerabilities in widely used web browsers and a …
-
News
Budworm Hackers Deploy Custom Malware in Telco and Govt Attacks
by CSC Newsby CSC News 2 minutes readBudworm Hackers Deploy Custom Malware in Telco and Govt Attacks: Chinese cyber-espionage group Budworm, also known as APT27 or Emissary Panda, has resurfaced with a sophisticated campaign targeting …
-
News
BlackTech APT: Hackers Breach Corporate Networks Via Network Router Attacks
by CSC Newsby CSC News 2 minutes readBlackTech APT: Hackers Breach Corporate Networks Via Network Router Attacks: The BlackTech APT hacking group, active since 2010, is making headlines for its sophisticated attacks on a wide …
-
News
Openfire Vulnerability: Hackers Exploiting Openfire Flaw to Encrypt Servers
by CSC Newsby CSC News 3 minutes readOpenfire Vulnerability – Hackers Exploiting Openfire Flaw to Encrypt Servers: Hackers are taking advantage of a significant vulnerability in Openfire messaging servers, encrypting them with ransomware and deploying …
-
News
Hotel Hackers Using Fake Booking.com Pages to Steal Guests’ Credit Cards
by Clement Akomea 5 minutes readHotel Hackers Using Fake Booking.com Pages to Steal Guests’ Credit Cards: Security researchers have uncovered a sophisticated information-stealing campaign where cybercriminals infiltrate hotel and booking site systems to …
-
How to GuidesEndpoint Security
20 Ways to Secure Your Devices From Hackers
by Clement Akomea 20 minutes readWell, the hackers don’t sleep, hence the need to find ways to secure your devices from them. In this article, you’re provided with 20 practical ways to secure …