EXLCUSIVE – The El_Cometa ransomware gang, formerly known as SynAck, has released today master decryption keys for the victims they infected between July 2017 and early...
A new variant of AdLoad malware is capable of bypassing Apple’s built-in antivirus tech XProtect to infect macOS. XProtect is Apple’s YARA signature-based solution used for...
The Pakistan-linked threat group’s campaign uses compromised WordPress sites to deliver the Warzone RAT to manufacturing companies in Taiwan and South Korea. Threat actors are using...
A new AdLoad malware variant is slipping through Apple’s YARA signature-based XProtect built-in antivirus tech to infect Macs as part of multiple campaigns tracked by SentinelOne security researchers. AdLoad...
Since 2019, Pegasus users have been able to install the software on smartphones with a missed call on WhatsApp. End-to-end encryption is technology that scrambles messages...
Telegram channels have become quite the hot seat for threat actors. Lately, a new Remote Access Trojan (RAT) has entered the landscape, propagating via Telegram channels....
Group-IB security researchers have shared a technical analysis of Prometheus TDS, an underground service that over the past several months has been used for the distribution...
The latest variants of the Monero-mining malware exploit known web server bugs and add efficiency to the mining process. A freshly discovered variant of the Golang...
Details of 30 servers thought to be used by Russia’s SVR spy agency (aka APT29) as part of its ongoing campaigns to steal Western intellectual property...
U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, schools, and hospitals are becoming increasingly reliant on technology. The Center for Internet Security’s (CIS’s) Malicious Domain...