admin
April 22, 2024
Between crossovers - Do threat actors play dirty or desperate?
In our dataset of over 11,000 victim...
admin
April 22, 2024
New research has found that the DOS-to-NT path conversion process could be exploited by threat actors to...
admin
April 22, 2024
Microsoft has revealed that North Korea-linked state-sponsored cyber actors has begun to use artificial intelligence (AI) to...
admin
April 21, 2024
A new information stealer has been found leveraging Lua bytecode for added stealth and sophistication, findings from...
admin
April 20, 2024
Palo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that has come under...
admin
April 20, 2024
Users of the CrushFTP enterprise file transfer software are being urged to update to the latest version following the discovery of a...
admin
April 19, 2024
Technology, research, and government sectors in the Asia-Pacific region have been targeted by a threat actor called BlackTech as part...
admin
April 19, 2024
Attackers are increasingly making use of “networkless” attack techniques targeting cloud apps and identities. Here’s how attackers can (and are) compromising organizations...
admin
April 19, 2024
Threat actors behind the Akira ransomware group have extorted approximately $42 million in illicit proceeds after breaching...
admin
April 19, 2024
Government entities in the Middle East have been targeted as part of a previously undocumented campaign to deliver a...
admin
April 18, 2024
Select Ukrainian government networks have remained infected with a malware called OfflRouter since 2015.
Cisco Talos said its...
admin
April 18, 2024
The infamous cybercrime syndicate known as FIN7 has been linked to a spear-phishing campaign targeting the U.S....
admin
April 18, 2024
Threat actors are actively exploiting critical vulnerabilities in OpenMetadata to gain unauthorized access to Kubernetes workloads and...
admin
April 18, 2024
Super Low RPO with Continuous Data Protection:Dial Back to Just Seconds Before an Attack
Zerto, a Hewlett Packard...
admin
April 18, 2024
Sandboxes are synonymous with dynamic malware analysis. They help to execute malicious files in a safe virtual...
admin
April 18, 2024
A new Android trojan called SoumniBot has been detected in the wild targeting users in South Korea by leveraging...
admin
April 18, 2024
As many as 37 individuals have been arrested as part of an international crackdown on a cybercrime...
admin
April 18, 2024
A new Google malvertising campaign is leveraging a cluster of domains mimicking a legitimate IP scanner software...
admin
April 17, 2024
A previously undocumented "flexible" backdoor called Kapeka has been "sporadically" observed in cyber attacks targeting Eastern Europe, including Estonia...
admin
April 17, 2024
The introduction of Open AI’s ChatGPT was a defining moment for the software industry, touching off a...