djacidfx

djacidfx

Last seen: 1 hour ago

Passionate small family-based developer creating innovative solutions with a personal touch. Simplifying complexities one line of code at a time.

Member since Oct 5, 2023

Following (3)

Followers (2)

Cybercriminals Using Telekopye Telegram ...

More details have emerged about a malicious Telegram bot called Telekopye that's used by threat actors to pull off large-scale phi...

Read More

Tell Me Your Secrets Without Telling Me ...

The title of this article probably sounds like the caption to a meme. Instead, this is an actual problem GitGuardian's engineers h...

Read More

Hamas-Linked Cyberattacks Using Rust-Pow...

Cybersecurity researchers have shed light on a Rust version of a cross-platform backdoor called SysJoker, which is assessed to hav...

Read More

Kubernetes Secrets of Fortune 500 Compan...

Cybersecurity researchers are warning of publicly exposed Kubernetes configuration secrets that could put organizations at risk of...

Read More

Konni Group Using Russian-Language Malic...

A new phishing attack has been observed leveraging a Russian-language Microsoft Word document to deliver malware capable of harves...

Read More

Alert: New WailingCrab Malware Loader Sp...

Delivery- and shipping-themed email messages are being used to deliver a sophisticated malware loader known as WailingCrab. "The m...

Read More

6 Steps to Accelerate Cybersecurity Inci...

Modern security tools continue to improve in their ability to defend organizations’ networks and endpoints against cybercriminals....

Read More

Mirai-based Botnet Exploiting Zero-Day B...

An active malware campaign is leveraging two zero-day vulnerabilities with remote code execution (RCE) functionality to rope route...

Read More

N. Korean Hackers Distribute Trojanized ...

A North Korean state-sponsored threat actor tracked as Diamond Sleet is distributing a trojanized version of a legitimate applicat...

Read More

New Flaws in Fingerprint Sensors Let Att...

A new research has uncovered multiple vulnerabilities that could be exploited to bypass Windows Hello authentication on Dell Inspi...

Read More

Logan's Match 3

Logan's Match 3 is an addictive and fun match-3 puzzle game that will keep you entertained for hours on end. Help Logan, a young a...

Read More

Commando: Blazing Through

Get ready for the ultimate adrenaline-pumping, pixelated adventure with "Commando: Blazing Through" – the Android game that thrust...

Read More

Chop 'Til You Drop

Prepare your blades, for an epic fruit-slicing adventure awaits you! Unleash your inner ninja and conquer three exhilarating game ...

Read More

Deep Sea Pick Three

Dive into the depths of the ocean and embark on a thrilling adventure in Deep Sea Pick Three, a captivating match-three puzzle gam...

Read More

LockBit Ransomware Exploiting Critical C...

Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical security fl...

Read More

Play Ransomware Goes Commercial - Now Of...

The ransomware strain known as Play is now being offered to other threat actors "as a service," new evidence unearthed by Adlumin ...

Read More

New Agent Tesla Malware Variant Using ZP...

A new variant of the Agent Tesla malware has been observed delivered via a lure file with the ZPAQ compression format to harvest d...

Read More

How Multi-Stage Phishing Attacks Exploit...

Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into rev...

Read More

Kinsing Hackers Exploit Apache ActiveMQ ...

The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ servers to infect Linux s...

Read More

Malicious Apps Disguised as Banks and Go...

Android smartphone users in India are the target of a new malware campaign that employs social engineering lures to install fraudu...

Read More