A group of Israeli researchers has devised a new technique to exfiltrate data from a PC in an air-gapped network through malware controlled…
The Callisto APT Group borrowed the source code leaked by hackers that broke into Hacking Team network. According to F-Secure Labs,…
Symantec reportedly linked the CIA hacking tools to several cyber attacks powered over the years by the Longhorn group. Security…
Security experts uncovered a widespread campaign tracked as Operation Cloud Hopper known to be targeting managed service providers (MSPs) worldwide.…
Experts at Kaspersky presented the findings of its research that definitively connect the Moonlight Maze cyber espionage campaigns to the…
The Russian group Turla has continued to improve its Carbon backdoor, experts from ESET detected new versions released on a…
Experts at FireEye discovered the APT29 group adopted domain fronting long before these techniques were widely known in the IT…
US federal prosecutors speculate the involvement of North Korea in the cyber heist of $81 million from Bangladesh's account at the New…
The threat group behind the Machete cyber espionage campaign first spotted in 2014 continues to target entities in Spanish-speaking countries.…
The role of China (PRC) in the worldwide cyber espionage game of conditioning political life: when reserved information are brandished…
This website uses cookies.