Researchers Shed Light on CatB Ransomware’s Evasion Techniques
The threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to...
The threat actors behind the CatB ransomware operation have been observed using a technique called DLL search order hijacking to...
This article has not been generated by ChatGPT. 2022 was the year when inflation hit world economies, except in one...
The notorious Emotet malware, in its return after a short hiatus, is now being distributed via Microsoft OneNote email attachments...
A new malware botnet was discovered targeting Realtek SDK, Huawei routers, and Hadoop YARN servers to recruit devices into DDoS...
The Emotet malware is now distributed using Microsoft OneNote email attachments, aiming to bypass Microsoft security restrictions and infect more...
The zero-day exploitation of a now-patched medium-severity security flaw in the Fortinet FortiOS operating system has been linked to a...
U.S. government agencies have released a joint cybersecurity advisory detailing the indicators of compromise (IoCs) and tactics, techniques, and procedures...
U.S. law enforcement authorities have arrested a New York man in connection with running the infamous BreachForums hacking forum under...
The NBA (National Basketball Association) is notifying fans of a data breach after some of their personal information, "held" by...
Ukraine's cyberpolice has arrested the developer of a remote access trojan (RAT) malware that infected over 10,000 computers while posing...
Hitachi Energy confirmed it suffered a data breach after the Clop ransomware gang stole data using a zero-day GoAnyway zero-day...
U.S. law enforcement arrested on Wednesday a New York man believed to be Pompompurin, the owner of the BreachForums hacking...
The fallout from the Clop ransomware attacks on GoAnywhere platforms has become apparent this week, with the threat actors starting...
An Android voice phishing (aka vishing) malware campaign known as FakeCalls has reared its head once again to target South...
Copycat websites for instant messaging apps like Telegram and WhatApp are being used to distribute trojanized versions and infect Android...
In the modern corporate IT environment, which relies on cloud connectivity, global connections and large volumes of data, the browser...
Think of the typical portrayal of a cyberattack. Bad guy pounding furiously on a keyboard, his eyes peeking out from...
A new Golang-based botnet dubbed HinataBot has been observed to leverage known flaws to compromise routers and servers and use...
A threat actor is selling on a Russian-speaking hacking forum what they claim to be hundreds of gigabytes of data...
Security researchers have shared technical details for exploiting a critical Microsoft Outlook vulnerability for Windows (CVE-2023-23397) that allows hackers to remotely...
Last year, a U.S. federal agency's Microsoft Internet Information Services (IIS) web server was hacked by exploiting a critical .NET...
The Federal Bureau of Investigation (FBI) revealed in its 2022 Internet Crime Report that ransomware gangs breached the networks of...
LockBit ransomware has claimed a cyber attack on Essendant, a wholesale distributer of office products after a "significant" and ongoing...
Nord Security (Nord) has released the source code of its Linux NordVPN client and associated networking libraries in the hopes...