Lax policies for package naming on Microsoft’s PowerShell Gallery code repository allow threat actors to perform typosquatting attacks, spoof popular packages and potentially lay the ground...
The Cybersecurity and Infrastructure Security Agency led the nation’s largest annual election security exercise this week, working with the Justice Department, the FBI and other federal...
The developers of Raccoon Stealer information-stealing malware have ended their 6-month hiatus from hacker forums to promote a new 2.3.0 version of the malware to cyber...
Researchers have uncovered a massive campaign that delivered proxy server apps to at least 400,000 Windows systems. The devices act as residential exit nodes without users’ consent...
In today’s ever-evolving digital landscape, the significance of effective malware detection remains paramount. With the escalating threat of cyberattacks, cybersecurity serves as a crucial shield against...
An alarming number of 120,000 computers have been infiltrated by stealer malware, and the credentials obtained from these infected devices are linked to cybercrime forums, a...
In today’s ever-evolving digital landscape, the significance of effective malware detection remains paramount. With the escalating threat of cyberattacks, cybersecurity serves as a crucial shield against...
The Monti ransomware gang has returned, after a two-month break from publishing victims on their data leak site, using a new Linux locker to target VMware ESXi...
Hackers use legitimate Amazon Web Services (AWS) S3 buckets to send phishing emails. Recent trends have seen cybercriminals leveraging well-known platforms like Google, QuickBooks, and PayPal to send...
In the face of rising cyber threats, the healthcare sector has become a hotbed for cyberattacks. Given the gravity of this situation, we sat down with...