Wikileaks published a new batch of 27 documents detailing the Grasshopper framework used by its agents to create custom installers…
Security experts uncovered a widespread campaign tracked as Operation Cloud Hopper known to be targeting managed service providers (MSPs) worldwide.…
Security experts at CISCO Talos have spotted a new insidious remote access tool dubbed ROKRAT that implements sophisticated anti-detection measures.…
Experts at Kaspersky presented the findings of its research that definitively connect the Moonlight Maze cyber espionage campaigns to the…
WikiLeaks has published the third batch of documents dubbed Marble that revealed the CIA anti-forensics tool dubbed Marble framework. WikiLeaks…
The Russian group Turla has continued to improve its Carbon backdoor, experts from ESET detected new versions released on a…
Experts at FireEye discovered the APT29 group adopted domain fronting long before these techniques were widely known in the IT…
British interior minister Amber Rudd believes encryption implemented by messaging services is offering a dangerous opportunity for terrorists to communicate.…
According to a German top official, Germany warded off two cyber attacks launched by the Russian state actor APT28 group…
Security researchers at MalwareBytes have uncovered a spearphishing campaign that targeted Saudi Arabia Government organizations. Security experts at MalwareBytes have…
This website uses cookies.