The rapid expansion of the internet has provided an ideal environment for malware to thrive. As more people and organizations connect to the internet, more opportunities...
Ransomware’s new favorite victim is educational institutions. Ransomware attacks that exploit targets utilizing malicious software code have increased tremendously over the past few years. In addition...
Python developers worldwide share and download code through PyPI (Python Package Index), a popular repository for software packages for the Python programming language. PyPI is widely...
A firewall serves as a barrier to unapproved network traffic. Additional organizational security policies are enforced to achieve this, including active traffic monitoring of incoming and...
A phishing website impersonating the popular Russian site CryptoPro CSP has been detected by the Cyble Research and Intelligence Labs (CRIL) in a recent discovery. The...
VirusTotal has introduced a Crowdsourced YARA Hub to overcome this hurdle, letting users find and filter existing rules, track a new rule, and export rules to LiveHunt or...
Researchers from Threatmon uncovered a targetted PowerShell backdoor malware attack from APT41 that bypasses the detections and allows threat actors to execute commands, download and upload...
New Android spyware, BouldSpy detected recently by Lookout Threat Lab, linked with moderate certainty to Iran’s Law Enforcement Command of the Islamic Republic of Iran. Named...
Airtag, Smart tags are devices used to find the location of lost items like Luggage, keys, purses, or mobile phones. These location trackers are very handy...
The cybersecurity security researchers at Sophos recently detected the “Dragon Breath” APT group (aka Golden Eye Dog, APT-Q-27) using complex DLL sideloading variations to avoid detection....
Recent Comments