A researcher revealed how to bypass some of the filters in Cisco Secure Email Gateway appliance and deliver malware using…
Researchers warn of threat actors employing a new Go-based malware dubbed Aurora Stealer in attacks in the wild. Aurora Stealer…
The Emotet malware is back and experts warn of a high-volume malspam campaign delivering payloads like IcedID and Bumblebee. Proofpoint…
A researcher published details and proof-of-concept (PoC) code for High-Severity macOS Sandbox escape vulnerability tracked as CVE-2022-26696. Researcher Wojciech Reguła…
Researchers at Google Cloud identified 34 different hacked release versions of the Cobalt Strike tool in the wild. Cobalt Strike…
Proof-of-concept exploit code for two actively exploited Microsoft Exchange ProxyNotShell flaws released online. Proof-of-concept exploit code has been released online…
Microsoft warns that a threat actor, tracked as DEV-0569, is using Google Ads to distribute the recently discovered Royal ransomware.…
Every year during Black Friday and Cyber Monday, crooks take advantage of the bad habits of users with fraudulent schema.…
Hive ransomware operators have extorted over $100 million in ransom payments from over 1,300 companies worldwide as of November 2022.…
A threat actor tracked as WASP is behind an ongoing supply chain attack targeting Python developers with the WASP Stealer.…
This website uses cookies.