The gang behind Quantum Locker used a particular modus operandi to target large enterprises relying on cloud services in the…
Let's give a look at API vulnerabilities by reading the API Security Top 10 published by the Open Web Application…
A researcher revealed how to bypass some of the filters in Cisco Secure Email Gateway appliance and deliver malware using…
Researchers warn of threat actors employing a new Go-based malware dubbed Aurora Stealer in attacks in the wild. Aurora Stealer…
Two Estonian citizens were arrested in Tallinn for allegedly running a $575 million cryptocurrency fraud scheme. Two Estonian nationals were…
The Emotet malware is back and experts warn of a high-volume malspam campaign delivering payloads like IcedID and Bumblebee. Proofpoint…
A researcher published details and proof-of-concept (PoC) code for High-Severity macOS Sandbox escape vulnerability tracked as CVE-2022-26696. Researcher Wojciech Reguła…
Google won a lawsuit filed against two Russian nationals involved in the operations of the Glupteba botnet. This week, Google…
Researchers at Google Cloud identified 34 different hacked release versions of the Cobalt Strike tool in the wild. Cobalt Strike…
Experts from Cyble Research and Intelligence Labs (CRIL) discovered three new ransomware families: AXLocker, Octocrypt, and Alice Ransomware. Threat intelligence…
This website uses cookies.