Trend Micro researchers have been monitoring a threat actor known as Water Orthrus since 2021, as they employed pay-per-install networks to distribute the CopperStealer malware. The...
Group-IB’s cybersecurity researchers made a significant discovery, revealing undisclosed attack infrastructure employed by the highly active state-sponsored group SideWinder. Their targets mainly encompassed entities situated in:- ...
OpenAI officially announced the release of an official iOS app that gives users access to its well-known AI chatbot on the move. According to the company, the...
Reports indicate that PharMerica Healthcare has faced a data breach resulting in 5.8 million records being exposed. PharMerica is one of the Fortune 1000 companies that provide Pharmacy...
Top-Level Domains (TLDs) have been extremely popular ever since the emergence of the internet. ICANN is the organization that is responsible for these TLD registrations. Domains...
Recently, the cybersecurity experts at Checkpoint identified that the Chinese state-sponsored group “Camaro Dragon” employs a custom “Horse Shell” malware embedded in TP-Link routers’ firmware to...
Threat actors have been evading in-built scanners in the cloud and local systems but archiving them as password-protected ZIP files. This makes it hard for scanners...
The role of info stealers (aka stealers) in the cybercrime world has been growing, according to researchers at the SecureWorks Counter Threat Unit (CTU). While threat...
Trend Micro researchers have been monitoring a threat actor known as Water Orthrus since 2021, as they employed pay-per-install networks to distribute the CopperStealer malware. The...
Over the years, mobile devices like smartphones, tablets, and laptops have been extensively used to get work done, primarily due to these powerful devices facilitating mobility...
Recent Comments