
Author: Tekno Phreak
-
Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
It’s so hard to believe that people fall for these scams, but it happens so often that we need to…
-
XWorm – The Most Active RAT Uses New Stagers and Loaders to Bypass Defenses
XWorm has emerged as one of the most versatile and actively distributed remote access trojans in the current threat landscape,…
-
Threat Actors Abused AV – EDR Evasion Framework In-The-Wild to Deploy Malware Payloads
Cybersecurity researchers have uncovered a concerning development as malicious actors began exploiting SHELLTER, a commercial anti-virus and endpoint detection response…
-
Scattered Spider Upgraded Their Tactics to Abuse Legitimate Tools to Evade Detection and Maintain Pe
The cybercriminal group known as Scattered Spider has significantly evolved its attack methodologies, demonstrating alarming sophistication in exploiting legitimate administrative…
-
How to get into cybersecurity | Unlocked 403 cybersecurity podcast (S2E3)
VideoHow to get into cybersecurity -| Unlocked 403 cybersecurity podcast (S2E3)==========================================================================Cracking the code of a successful cybersecurity career starts here.…
-
Task scams: Why you should never pay to get paid
ScamsTask scams: Why you should never pay to get paid================================================Some schemes might sound unbelievable, but they’re easier to fall for…
-
Google’s AI video maker Veo 3 is now available via $20 Gemini
Google says Veo 3, which is the company’s state-of-the-art video generator, is now shipping to everyone using the Gemini app…
-
ChatGPT Deep Research tests new connectors for more context
ChatGPT Deep Research, which is an AI research tool to automate research, is getting support for new connectors (integrations), including…
-
Taiwan NSB Alerts Public on Data Risks from TikTok, Weibo, and RedNote Over China Ties
Taiwan’s National Security Bureau (NSB) has warned that China-developed applications like RedNote (aka Xiaohongshu), Weibo, TikTok, WeChat, and Baidu Cloud…
-
Alert: Exposed JDWP Interfaces Lead to Crypto Mining, Hpingbot Targets SSH for DDoS
Threat actors are weaponizing exposed Java Debug Wire Protocol ([JDWP](https://docs.oracle.com/javase/8/docs/technotes/guides/jpda/jdwp-spec.html)) interfaces to obtain code execution capabilities and deploy cryptocurrency miners…

