All the exploits were propagated via watering hole attacks that redirected targets to an infrastructure that installed diverse malware depending on the browsers and devices.
- Next story IT admin with axe to grind sent to prison for wiping Microsoft user accounts
- Previous story Police in India Bust Call Center Scammers
Popular Tags
Android (249)
Attack (549)
attacks (523)
breach (305)
computer security (762)
Cyber (447)
cyber attacks (782)
cyber news (808)
Cybersecurity (547)
cyber security news (808)
cyber security news today (808)
cyber security updates (808)
cyber updates (808)
Data (702)
data breach (820)
Elon (228)
Google (323)
Hacker (322)
hacker news (767)
Hackers (510)
hacking (323)
hacking news (752)
hacks (251)
how to hack (752)
information security (781)
Malware (774)
Microsoft (382)
Million (317)
network security (773)
News (375)
Phishing (441)
Privacy (358)
Ransomware (1068)
ransomware malware (752)
security (1049)
software vulnerability (752)
Tech (335)
the hacker news (753)
Threat (229)
Twitter (386)
users (293)
vulnerabilities (467)
Vulnerability (288)
Windows (355)
ZDNet (249)