It was to be expected: As the buzz around Meta’s new microblogging platform Threads gained momentum, some individuals have stepped in to take advantage of the...
In today’s age of widespread device collaboration, the number of endpoints within an organization is often enormous. On top of this, Endpoints are now among the...
An unrecorded .NET Loader was identified during routine threat hunting that downloads, decrypts, and executes a wide range of malicious payloads. Multiple threat actors extensively distributed...
Generative AI technology is rapidly growing and advancing, driven by continuous research and development efforts. But, besides the growing advancements and positive things, these generative AI...
The latest research reveals a new sophisticated attack carried through Webapk technology targeting Android devices. The threat actors manipulate the user to install malicious web apk...
The significant plunge in cyber crimes shows a decent rise in legitimate services in the mid of this year, 2023. However, the rise in ransomware attacks...
Russia’s invasion of Ukraine on February 24, 2022, followed escalating cyber operations, categorized into six phases, by Russian troops amassed at the border. Beyond the focus...
A self-signed China-originated Rootkit acts as a universal downloader targeting gaming sectors to exfiltrate sensitive information. The threat actors abuse Microsoft signing portals to sign their...
A threat actor referred to as ‘RomCom’ has been targeting organizations supporting Ukraine and guests of the upcoming NATO Summit set to start tomorrow in Vilnius,...
New advanced malware targets LATAM businesses with TOITOIN Trojan, revealing intricate layers. The complete attack is based on a multi-stage process that involves the following key...