Earlier this month, security researchers discovered a new peer-to-peer (P2P) malware with self-spreading capabilities that targets Redis instances running on Internet-exposed Windows and Linux systems. The...
The Chinese state-backed APT41 hacking group is targeting Android devices with two newly discovered spyware strains dubbed WyrmSpy and DragonEgg by Lookout security researchers. APT41 is...
Campaigns of Fraudulent Job offers target university students in North America, asking victims to pay a fee in exchange for work. The campaigns began as early...
A new ransomware strain dubbed, Mallox (aka TargetCompany, FARGO, and Tohnichi) is actively targeting and attacking Microsoft SQL (MS-SQL) servers. Since June 2021, this new ransomware strain has...
OpenAI’s ChatGPT (GPT-3.5, GPT-4) and other LLMs like BERT, Bard, etc. have sparked widespread debate due to their disruptive applications across various fields. These LLM modules...
Businesses and developers are focusing more on the security of applications in their digital environment as cyber threats and data breaches continue escalating. The average data...
A North Korea based threat actor targeting personal accounts of technology firms through low-profile social engineering attempts. This campaign utilizes a combination of repository invitations and...
Threat actors deliver NetSupport RAT through a new campaign called Fake SG which could rival with SocGholish. This campaign utilizes hacked WordPress websites to display a custom...
The Cybersecurity and Infrastructure Security Agency (CISA) recently released a security advisory that indicates that threat actors have been exploiting a Zero-day vulnerability in Citrix ADC (Application Delivery...
With your on-premise security solution comprising hardware, software, signatures, rules, and machine learning, you may think your applications are fully protected. How do you know for...