Researchers Uncover Connection b/w Moses Staff and Emerging Abraham’s Ax Hacktivists Group

2 min read
admin
January 26, 2023
New research has linked the operations of a politically motivated hacktivist group known as Moses Staff to...
admin
January 26, 2023
Any organization that handles sensitive data must be diligent in its security efforts, which include regular pen...
admin
January 26, 2023
Cybersecurity researchers have unearthed a new Python-based attack campaign that leverages a Python-based remote access trojan (RAT)...
admin
January 26, 2023
At least two federal agencies in the U.S. fell victim to a "widespread cyber campaign" that involved...
admin
January 25, 2023
A massive campaign has infected over 4,500 WordPress websites as part of a long-running operation that's been...
admin
January 25, 2023
Security stakeholders have come to realize that the prominent role the browser has in the modern corporate...
admin
January 25, 2023
A North Korean nation-state group notorious for crypto heists has been attributed to a new wave of...
admin
January 25, 2023
LastPass-owner GoTo (formerly LogMeIn) on Tuesday disclosed that unidentified threat actors were able to steal encrypted backups...
admin
January 25, 2023
VMware on Tuesday released software to remediate four security vulnerabilities affecting vRealize Log Insight (aka Aria Operations for Logs)...
admin
January 24, 2023
The U.S. Federal Bureau of Investigation (FBI) on Monday confirmed that North Korean threat actors were responsible...
admin
January 24, 2023
Organizations in East Asia are being targeted by a likely Chinese-speaking actor dubbed DragonSpark while employing uncommon...
admin
January 24, 2023
Meta Platforms on Monday announced that it has started to expand global testing of end-to-end encryption (E2EE)...
admin
January 24, 2023
Vulnerability analysis results in Orange Cyberdefenses' Security Navigator show that some vulnerabilities first discovered in 1999 are still found...
admin
January 24, 2023
The Emotet malware operation has continued to refine its tactics in an effort to fly under the...
admin
January 24, 2023
Apple has backported fixes for a recently disclosed critical security flaw affecting older devices, citing evidence of...
admin
January 23, 2023
The move to SaaS and other cloud tools has put an emphasis on Identity & Access Management...
admin
January 23, 2023
Two security flaws have been disclosed in Samsung's Galaxy Store app for Android that could be exploited...
admin
January 23, 2023
The legitimate command-and-control (C2) framework known as Sliver is gaining more traction from threat actors as it emerges as an...
admin
January 23, 2023
Researchers have shut down an "expansive" ad fraud scheme that spoofed more than 1,700 applications from 120...
admin
January 20, 2023
Threat actors associated with the Roaming Mantis attack campaign have been observed delivering an updated variant of...