Quite some money can be made from selling compromised business and ad accounts on social media platforms, and the Ducktail...
Introduction As organizations move towards digitization, security has become a significant part of their operations. Software-Defined Perimeter (SDP) and Virtual Private Networks (VPN) are two of the most extensively used security...
Researchers from Threatmon uncovered a targetted PowerShell backdoor malware attack from APT41 that bypasses the detections and allows threat actors to execute commands, download and upload...
As federal officials call for tech firms to take more responsibility for the security of their products, some members of Congress and industry voices have highlighted...
Veeam backup servers are being targeted by at least one group of threat actors known to work with multiple high-profile ransomware gangs. Malicious activity and tools...
The Computer Emergency Response Team of Ukraine (CERT-UA) says Russian hackers are targeting various government bodies in the country with malicious emails supposedly containing instructions on how to...
The Service Location Protocol (SLP) has been found to have a new reflective Denial-of-Service (DoS) amplification vulnerability. Threat actors can exploit this vulnerability to execute extensive...
The Ukranian Cyber police officers tracked down the 36-year-old resident of Netishyn as he was selling the personal data of more than 300 million victims from...
Cybersecurity analysts at Horizon3 detected that thousands of Apache Superset servers are exposed to RCE attacks at default configurations. This could allow the threat actors to...
Google uses Cryptbot info stealer for infecting Chrome users and stealing data, taking down associated malware infrastructure. The sole goal of this lawsuit is to reduce...
Recently, the cybersecurity researchers at Cyble discovered a new macOS malware, ‘Atomic’ (aka ‘AMOS’), sold for $1,000/month on private Telegram channels. Buyers pay a high price...
Recent Comments