Threat actors have been evading in-built scanners in the cloud and local systems but archiving them as password-protected ZIP files. This makes it hard for scanners...
The role of info stealers (aka stealers) in the cybercrime world has been growing, according to researchers at the SecureWorks Counter Threat Unit (CTU). While threat...
Trend Micro researchers have been monitoring a threat actor known as Water Orthrus since 2021, as they employed pay-per-install networks to distribute the CopperStealer malware. The...
Over the years, mobile devices like smartphones, tablets, and laptops have been extensively used to get work done, primarily due to these powerful devices facilitating mobility...
A new APT hacking group dubbed Lancefly uses a custom ‘Merdoor’ backdoor malware to target government, aviation, and telecommunication organizations in South and Southeast Asia. The Symantec...
Bridewell’s Cyber Threat Intelligence (CTI) team has discovered previously undetected Ursnif infrastructure used in 2023 campaigns, suggesting that the malware operators have not yet utilized this...
The rapid expansion of the internet has provided an ideal environment for malware to thrive. As more people and organizations connect to the internet, more opportunities...
The Artificial Intelligence race has started since the release of ChatGPT in November 2022. There have been several Artificial Intelligence bots developed by organizations all over the world....
The cybersecurity researchers at Cisco Talos recently affirmed that threat actors are targeting the widely-used Microsoft 365 cloud-based productivity platform through the Greatness phishing platform, and...
QR codes, widely used by legitimate organizations for various purposes, such as advertisements and enforcing parking fees, are also being exploited by scammers for their fraudulent...