A new process injection technique named ‘Mockingjay’ could allow threat actors to bypass EDR (Endpoint Detection and Response) and other...
Secure email gateways and security software are becoming more and more advanced in an attempt to adapt to the ever-changing phishing campaigns and for this reason,...
Researchers from Adversa have developed an attack technique named Adversarial Octopus that could perform a targeted attack on facial recognition systems. It impacts several current AI-driven...
Cl0p, one of the most prominent ransomware groups, has been found to be active again after a recent crackdown by federal agencies. Though it kept its...
Key Takeaways After a months-long absence, the malware loader JSSLoader returned in June 2021 campaigns rewritten from the .NET programming language to C++. Rewriting the malware could be an...
A misconfigured cloud database exposed over 800 million records linked to WordPress users before its owner was notified, according to Website Planet. Security researcher Jeremiah Fowler explained that the...
Threat monitoring and identity access management provider FYEO on Wednesday announced that it emerged from stealth mode with the acquisition of threat intelligence company Intelliagg. The company’s FEYO...
Drata Inc., a new startup working to make it easier for companies to comply with cybersecurity standards, today announced that it has raised a $25 million funding round...
Microsoft says they have discovered new attacks conducted by the Russian state-sponsored Nobelium hacking group, including a hacked Microsoft support agent’s computer that exposed customer’s subscription...
The operator of a malware strain known as Crackonosh has made more than 9,000 Monero coins (estimated today at around $2 million) after infecting more than 222,000 Windows...
Anjuna, a provider of cloud application security, today announced that it has raised $30 million in Series B funding, which brings the total raised by the...
Recent Comments