LilithBot Malware, a new MaaS offere by the Eternity Group
Researchers linked the threat actor behind the Eternity malware-as-a-service (MaaS) to a new malware strain called LilithBot. Zscaler researchers linked a...
Researchers linked the threat actor behind the Eternity malware-as-a-service (MaaS) to a new malware strain called LilithBot. Zscaler researchers linked a...
A bug in Linux Kernel 5.19.12 that was released at the end of September 2022 can potentially damage the displays...
Explore why secure web gateway (SWG) is important to effectively secure cloud resources and reduce cyber risk across the attack...
Good cyber hygiene starts with buy-in from across the enterprise. Discover how CISOs can establish a company-wide security culture to...
Cisco fixed high-severity flaws in some of its networking and communications products, including Enterprise NFV, Expressway and TelePresence. Cisco announced...
The City of Tucson, Arizona disclosed a data breach, the incident was discovered in May 2022 and impacted 123,500 individuals....
The Australian Federal Police (AFP) arrested a 19-year-old teen from Sydney for attempting to use data from the Optus data...
Researchers at cybersecurity firm Resecurity spotted a new group of hacktivists targeting financial institutions in Egypt, Resecurity, a California-based cybersecurity...
Introduction We are often asked how targets are infected with malware. Our answer is nearly always the same: (spear) phishing....
Avast released a free decryptor for variants of the Hades ransomware tracked as ‘MafiaWare666’, ‘Jcrypt’, ‘RIP Lmao’, and ‘BrutusptCrypt,’ ....
In the second part of our Water Labbu blog series, we explore how the threat actor exploits Electron-based applications using...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards...
Hundreds of Microsoft SQL servers all over the world have been infected with a new piece of malware tracked as Maggie....
Bad news for the Australian telecommunications industry, the largest company in the country Telstra suffered a data breach. Australia’s largest...
OnionPoison: researchers reported that an infected Tor Browser installer has been distributed through a popular YouTube channel. Kaspersky researchers discovered...
While performing regular threat hunting activities, we identified multiple downloads of previously unclustered malicious Tor Browser installers. According to our...
Dr. Ivan Pavlov once said: “If you want new ideas, read old books.” The same applies with cybersecurity best practices....
For over 10 years, security researchers have been observing and keeping tabs of APT group Earth Aughisky’s malware families and...
William Malik, VP of Infrastructure Strategies, shares his opinions on the goals and objectives outlined in the CISA Strategic Plan...
The parasitic Water Labbu capitalizes on the social engineering schemes of other scammers, injecting malicious JavaScript code into their malicious...
Experts disclosed a flaw in the PHP software package repository Packagist that could have been exploited to carry out supply...
North Korea-linked Lazarus APT has been spotted deploying a Windows rootkit by taking advantage of an exploit in a Dell...
Researchers link recently discovered Linux ransomware Cheerscrypt to the China-linked cyberespionage group DEV-0401. Researchers at cybersecurity firm Sygnia attributed the...
The mitigation shared by Microsoft for the two recently disclosed Exchange zero-day vulnerabilities can be bypassed, expert warns. Last week,...