Researchers from Threatmon uncovered a targetted PowerShell backdoor malware attack from APT41 that bypasses the detections and allows threat actors to execute commands, download and upload...
T-Mobile claims it discovered that threat actors had gained limited access to information from a few accounts. This is the year’s second instance of a data...
CISA recently included three actively exploited vulnerabilities in the wild in its KEV (Known Exploited Vulnerabilities) catalog. The three actively exploited vulnerabilities are detected in:- Here below we...
New Android spyware, BouldSpy detected recently by Lookout Threat Lab, linked with moderate certainty to Iran’s Law Enforcement Command of the Islamic Republic of Iran. Named...
Police confiscated the illicit “Monopoly Market” dark web marketplace and arrested 288 people buying or selling drugs on the dark web as part of an operation...
Airtag, Smart tags are devices used to find the location of lost items like Luggage, keys, purses, or mobile phones. These location trackers are very handy...
Offline since February, the new system will have improved cybersecurity countermeasures. A critical U.S. Marshals Service computer system that has been offline since February after suffering a ransomware...
Recently, Zyxel, the networking equipment manufacturer, has issued critical security patches for its firewall devices to fix a vulnerability allowing RCE on the affected systems. This...
Introduction As organizations move towards digitization, security has become a significant part of their operations. Software-Defined Perimeter (SDP) and Virtual Private Networks (VPN) are two of the most extensively used security...
Researchers from Threatmon uncovered a targetted PowerShell backdoor malware attack from APT41 that bypasses the detections and allows threat actors to execute commands, download and upload...