Author: Tekno Phreak


  • Is Foodaki a Scam? Wishing You a Merry Christmas and Happy New Year

    * ![Category](https://www.onlinethreatalerts.com/images/icon-225.png) [Spamming – Adware](/categories/spamming-adware/) Is Foodaki a Scam? Wishing You a Merry Christmas and Happy New Year===================================================================* ![Comments](https://www.onlinethreatalerts.com/images/comment4.png) 0…


  • Unmasking online threats – How a VPN ensures security and safety

    * ![Category](https://www.onlinethreatalerts.com/images/icon-225.png) [Useful – Informative](/categories/useful-informative/) Unmasking online threats — How a VPN ensures security and safety=================================================================* ![Comments](https://www.onlinethreatalerts.com/images/comment4.png) 0 0* ![OTA](https://www.onlinethreatalerts.com/images/eye.png)…


  • Massive VW Group Data Leak Exposed 800,000 EV Owners’ Movements, From Homes To Brothels

    Thanos Pappas reports: Many people worry about hackers stealing their personal data, but sometimes, the worst breaches come not from…


  • White House links ninth telecom breach to Chinese hackers

    ![Chinese hacker](https://www.bleepstatic.com/content/hl-images/2024/05/22/Chinese_hackers.png)A White House official has added a ninth U.S. telecommunications company to the list of telecoms breached in a…


  • North Korea actors use OtterCookie malware in Contagious Interview campaign

    North Korea-linked threat actors are using the OtterCookie backdoor to target software developers with fake job offers.———————————————————————————————————————–North Korea-linked threat actors…


  • 15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials

    ![New Exploit](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEM4Efw4NqigkpMJJ2VA_agA2oS2brssc6OLY4vJoz7cqi9kgYhNRAtSfJV9BE3bqguhsOj-nlfg7NrG8qoW6BgRmIKwDksdSJrz19_WogbmREJ8Dk399t8KJ9W9O_1bhSDzCMR-coAXcd-zNYDqKaVgoFiS-A8o5HoyetT4TEtW1Ph0_V9p9yYn3B0FqD/s728-rw-e365/router.png ‘New Exploit’)A high-severity flaw impacting select Four-Faith routers has come under active exploitation in the wild, according to…


  • Attacks by APTC60 Group Exploiting Legitimate Services

    The APT-C-60 group targeted organizations in Japan and East Asia with a sophisticated attack campaign. The attack begins with a…


  • Gaming Engines: An Undetected Playground for Malware Loaders

    Check Point Research uncovered a new technique exploiting the Godot Engine to execute malicious GDScript code, remaining undetected by most…


  • Emerging Threats & Vulnerabilities to Prepare for in 2025

    * [Vulnerabilities -& Threats](/vulnerabilities-threats)* [Cyber Risk](/cyber-risk)* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)* [Threat Intelligence](/threat-intelligence)Emerging Threats -& Vulnerabilities to Prepare for in 2025…


  • SEC Disclosures Up, But Not Enough Details Provided

    * [Cyber Risk](/cyber-risk)* [Cyberattacks -& Data Breaches](/cyberattacks-data-breaches)[![The Edge Logo](https://eu-images.contentstack.com/v3/assets/blt6d90778a997de1cd/blt530eb1f4e672eb44/653a71690e92cc040a3e9d6d/Dark_Reading_Logo_TheEdge_0.png?width=700&auto=webp&quality=80&disable=upscale ‘The Edge Logo’)Cybersecurity In-Depth: Digging into data about the latest attacks,…