Hackers exploit Google Docs in new phishing campaign Lance WhitneyOne of the favorite tactics of cybercriminals is to exploit legitimate products for illegitimate purposes. And the more popular the product, the greater the chances of success. A
Hackers exploit Google Docs in new phishing campaign Lance WhitneyOne of the favorite tactics of cybercriminals is to exploit legitimate products for illegitimate purposes. And the more popular the product, the greater the chances of success. A
Beware of Fake Telegram Messenger App Hacking PCs with Purple Fox Malware Ravie Lakshmanan Trojanized installers of the Telegram messaging application are being used to distribute the Windows-based Purple Fox backdoor on compromised systems.That's according to new
Microsoft Issues Fix for Exchange Y2K22 Bug That Crippled Email Delivery Service Ravie Lakshmanan Microsoft, over the weekend, rolled out a fix to address an issue that caused email messages to get stuck on its Exchange Server
'Spider-Man: No Way Home' Pirated Downloads Contain Crypto-Mining Malware Mohit Kumar Peter Parker might not be a mastermind cryptocurrency criminal, but the name Spiderman is quickly becoming more associated with the mining landscape. ReasonLabs, a leading provider