New Mockingjay process injection technique evades EDR detection
A new process injection technique named 'Mockingjay' could allow threat actors to bypass EDR (Endpoint Detection and Response) and other...
A new process injection technique named 'Mockingjay' could allow threat actors to bypass EDR (Endpoint Detection and Response) and other...
Mark your calendar for mWISE™, the uniquely targeted, community-focused cybersecurity conference from Mandiant. It runs from September 18 – 20,...
A 8Base ransomware gang is targeting organizations worldwide in double-extortion attacks, with a steady stream of new victims since the...
Censys researchers have discovered hundreds of Internet-exposed devices on the networks of U.S. federal agencies that have to be secured...
Europol announced today that the takedown of the EncroChat encrypted mobile communications platform has led to the arrest of over...
Siemens Energy has confirmed that data was stolen during the recent Clop ransomware data-theft attacks using a zero-day vulnerability in...
Data protection vendor Arcserve has addressed a high-severity security flaw in its Unified Data Protection (UDP) backup software that can...
The Brave team has announced that the privacy-centric browser will soon introduce new restriction controls allowing users to specify how...
The Akira ransomware operation uses a Linux encryptor to encrypt VMware ESXi virtual machines in double-extortion attacks against companies worldwide....
Business Email Compromise (BEC) poses a growing threat to businesses of all sizes. As BEC attacks have almost doubled across...
The NPM (Node Package Manager) registry suffers from a security lapse called "manifest confusion," which undermines the trustworthiness of packages...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Drones that don't have any known security weaknesses could be the target of electromagnetic fault injection (EMFI) attacks, potentially enabling...
Cybersecurity researchers have exposed the workings of a scam ring called CryptosLabs that's estimated to have made €480 million in...
For too long the cybersecurity world focused exclusively on information technology (IT), leaving operational technology (OT) to fend for itself....
A ransomware threat called 8Base that has been operating under the radar for over a year has been attributed to...
Multiple SQL injection vulnerabilities have been disclosed in Gentoo Soko that could lead to remote code execution (RCE) on vulnerable...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A new process injection technique dubbed Mockingjay could be exploited by threat actors to bypass security solutions to execute malicious...
Cybersecurity researchers have discovered a new ongoing campaign aimed at the npm ecosystem that leverages a unique execution chain to...
Europol on Tuesday announced that the takedown of EncroChat in July 2020 led to 6,558 arrests worldwide and the seizure...
As the business environment becomes increasingly connected, organizations' attack surfaces continue to expand, making it challenging to map and secure...
A new Android malware campaign has been observed pushing the Anatsa banking trojan to target banking customers in the U.S.,...
Fortinet has rolled out updates to address a critical security vulnerability impacting its FortiNAC network access control solution that could...