A new strand of malware uses Word files with macros to download a PowerShell script from GitHub. This PowerShell script further downloads a legitimate image file...
An authentication bypass vulnerability in the SolarWinds Orion software may have been leveraged by adversaries as a zero-day to deploy the SUPERNOVA malware in target environments....
As if the exponential rise in phishing scams and malware attacks in the last five years wasn’t enough, the COVID-19 crisis has worsened it further. The...
FireEye has discovered additional details about the SUNBURST backdoor since our initial publication on Dec. 13, 2020. Before diving into the technical depth of this malware,...
The FBI should establish a “formalized bureau-wide dark web strategy” to address operational shortcomings in how it tackles illegal darknet activities, a Department of Justice (DoJ)...
A team of security researchers has developed a DIY appliance to detect stalkerware and other malware on smartphones. TinyCheck is open source software designed to be...
Global cybersecurity authorities have issued warnings after a supply chain attack on a US software provider was deemed responsible for last week’s FireEye hack. Cyber threat detection firm...
Two new backdoors have been attributed to the Molerats advanced persistent threat (APT) group, which is believed to be associated with the Palestinian terrorist organization Hamas....
Security researchers on Thursday documented and described a new injection technique capable of extracting sensitive data from PDF files. “One simple link can compromise the entire...
A new Joint Cybersecurity Advisory, coauthored by the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and...
Recent Comments