Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.
Recent: |
|
Past: |
|
The threat actors mainly targeted organizations across Azerbaijan, Tajikistan and Kyrgyzstan → Read More
The kit is written in NodeJS and has automated setup and detection evasion capabilities → Read More
The Agency will warn critical infrastructure entities to enable mitigation before an incident → Read More
13 vulnerabilities were found in the E11 smart intercom devices by Chinese manufacturer Akuvox → Read More
The relationship between Europe and ASEAN countries is being exploited with social engineering lures → Read More
Infostealers observed to be delivered via these videos included Vidar, RedLine and Raccoon → Read More
The campaign leveraged the exploitation of a flaw in IBM's Aspera Faspex file-sharing software → Read More
Weekly attacks targeting Ukraine decreased by 44% between October 2022 and February 2023 → Read More
ScrubCrypt malware obfuscates and encrypts applications to evade antivirus detection → Read More
Kernelware threat actor claimed responsibility for the hack on a dark web forum → Read More
The White House and a bipartisan group of 12 senators have endorsed the legislation → Read More
The North Korean threat actor known as Lazarus Group has been spotted exploiting flaws in unnamed software to gain access to a South Korean finance firm twice last year. The news comes from security researchers at Asec, who published an advisory about the attacks on Tuesday. The company recorded the first of the attacks in May 2022, while the second occurred in October of the same year. Both… → Read More
The campaign lured Facebook business accounts with Google ads and fake Facebook profiles → Read More
New campaign leverages a new version of the SoulSearcher loader and the Soul modular framework → Read More
The findings come from Microsoft, in an advisory published on Monday → Read More
A Catalonia government statement attributed the attack to the threat actor known as RansomHouse → Read More
Kaspersky said the figures represented a 1.5 increase compared with the second half of 2021 → Read More
The memorandum highlights the need for states to include cybersecurity in periodic audits → Read More
Police also seized electronic equipment and are currently performing forensic examinations → Read More
Unlike the group’s usual tactics, MQsTTang only has a single stage and does not use obfuscation → Read More