Since 2019, Pegasus users have been able to install the software on smartphones with a missed call on WhatsApp. End-to-end encryption is technology that scrambles messages...
Telegram channels have become quite the hot seat for threat actors. Lately, a new Remote Access Trojan (RAT) has entered the landscape, propagating via Telegram channels....
Group-IB security researchers have shared a technical analysis of Prometheus TDS, an underground service that over the past several months has been used for the distribution...
The latest variants of the Monero-mining malware exploit known web server bugs and add efficiency to the mining process. A freshly discovered variant of the Golang...
Details of 30 servers thought to be used by Russia’s SVR spy agency (aka APT29) as part of its ongoing campaigns to steal Western intellectual property...
U.S. State, Local, Tribal, and Territorial (SLTT) government organizations, schools, and hospitals are becoming increasingly reliant on technology. The Center for Internet Security’s (CIS’s) Malicious Domain...
D-Box said it is recovering from a ransomware attack that partially paralyzed many of its IT systems earlier this month. In a statement issued on Wednesday (July 29), the Canadian...
The Python Package Index (PyPI) registry has removed several Python packages this week aimed at stealing users’ credit card numbers, Discord tokens, and granting code execution capabilities...
No More Ransom has celebrated its fifth anniversary of helping victims to recover from ransomware attacks. The decryptors available in the No More Ransom repository have helped more...
Targets of Discord malware expand far beyond gamers. Discord has a malware problem. And although the platform is predominantly used by gamers, it turns out even...
Recent Comments