admin
April 7, 2023
In yet another sign that Telegram is increasingly becoming a thriving hub for cybercrime, researchers have found that threat...
admin
April 7, 2023
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has published eight Industrial Control Systems (ICS) advisories warning of critical flaws...
Microsoft Takes Legal Action to Disrupt Cybercriminals’ Illegal Use of Cobalt Strike Tool

2 min read
admin
April 7, 2023
Microsoft said it teamed up with Fortra and Health Information Sharing and Analysis Center (Health-ISAC) to tackle...
admin
April 7, 2023
Less than a month ago, Twitter indirectly acknowledged that some of its source code had been leaked...
Supply Chain Attacks and Critical Infrastructure: How CISA Helps Secure a Nation’s Crown Jewels

5 min read
admin
April 6, 2023
Critical infrastructure attacks are a preferred target for cyber criminals. Here's why and what's being done to...
admin
April 6, 2023
A coordinated international law enforcement operation has dismantled Genesis Market, an illegal online marketplace that specialized in...
admin
April 6, 2023
Google is enacting a new data deletion policy for Android apps that allow account creation to also...
admin
April 5, 2023
Portuguese users are being targeted by a new malware codenamed CryptoClippy that's capable of stealing cryptocurrency as part of...
admin
April 5, 2023
An unknown threat actor used a malicious self-extracting archive (SFX) file in an attempt to establish persistent...
admin
April 5, 2023
A North Korean government-backed threat actor has been linked to attacks targeting government and military personnel, think...
admin
April 5, 2023
Every year hundreds of millions of malware attacks occur worldwide, and every year businesses deal with the...
admin
April 5, 2023
The threat actor behind the information-stealing malware known as Typhon Reborn has resurfaced with an updated version (V2) that...
admin
April 4, 2023
Clouded vision
CTI systems are confronted with some major issues ranging from the size of the collection networks...
admin
April 4, 2023
Cybersecurity researchers have taken the wraps off a previously undocumented ransomware strain called Rorschach that's both sophisticated and fast.
"What...
admin
April 4, 2023
Chromium-based web browsers are the target of a new malware called Rilide that masquerades itself as a...
admin
April 4, 2023
The threat actor known as Arid Viper has been observed using refreshed variants of its malware toolkit in its...
admin
April 4, 2023
Collaboration sits at the essence of SaaS applications. The word, or some form of it, appears in...
admin
April 4, 2023
Microsoft has announced plans to automatically block embedded files with "dangerous extensions" in OneNote following reports that...
admin
April 4, 2023
The adversary behind the supply chain attack targeting 3CX deployed a second-stage implant specifically singling out a small number...
admin
April 3, 2023
The Italian data protection watchdog, Garante per la Protezione dei Dati Personali (aka Garante), has imposed a...