‘Elusive Comet’ Attackers Use Zoom to Swindle Victims Posted on April 21, 2025 The threat actor uses sophisticated social engineering techniques to infect a victim’s device, either with an infostealer or remote access Trojan (RAT).
Azure API Management flaws highlight server-side request forgery risks in API development News Microsoft recently patched three vulnerabilities in its Azure API Management… rooter May 5, 2023 1 min read 0
India Repatriates Citizens Duped Into Forced Cyber Fraud Labor in Cambodia News So far some 250 citizens have been rescued and returned… rooter April 4, 2024 1 min read 0
CISA and FBI Release Advisory on How Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications News CISA, in partnership with the Federal Bureau of Investigation (FBI),… rooter January 22, 2025 1 min read 0
U.S. Internet Leaked Years of Internal, Customer Emails News The Minnesota-based Internet provider U.S. Internet Corp. has a business… rooter February 23, 2024 5 min read 0