A platform for sharing and requesting indicators of compromise (IoCs) associated with different malware strains is the latest open source intelligence (OSINT) service launched by Abuse.ch....
Unpatched network-attached storage (NAS) devices are targeted in ongoing attacks where the attackers try to take them over and install cryptominer malware to mine for cryptocurrency....
The ransomware market, fueled by coronavirus pandemic turbulence, has become the biggest single money earner for cybercriminals, according to a new report. Threat hunting and cyber-intelligence...
FireEye and Microsoft on Thursday said they discovered three more malware strains in connection with the SolarWinds supply-chain attack, including a “sophisticated second-stage backdoor,” as the...
Since its emergence, ObliqueRAT has been embracing new technical capabilities incessantly. Cisco Talos researchers have identified a newly designed ObliqueRAT campaign, adopting new infection and evasion...
The use of artificial intelligence (AI) in cybersecurity, while often overhyped, is not a new concept. Hackers have included countermeasures in malware since its inception to...
Certain Google-owned domains have caused Chrome users, from even the most skilled researchers to regular users, to question whether they are malicious. The domains I am...
Sophos has published new research, “Gootloader Expands Its Payload Delivery Options,” that details how the delivery method for the six-year-old Gootkit financial malware has been developed into...
There’s been a 2,000% increase of new malware written in Go over the past few years. The number of malware strains coded in the Go programming...
A new Ryuk ransomware variant with worm-like capabilities that allow it to spread to other devices on victims’ local networks has been discovered by the French...
Recent Comments