Double header: IsaacWiper and CaddyWiper
As war in Ukraine rages, new destructive malware continues to be discovered. In this short blog post, we will review...
As war in Ukraine rages, new destructive malware continues to be discovered. In this short blog post, we will review...
Google’s TAG team revealed that China-linked APT groups are targeting Ukraine ’s government for intelligence purposes. Google’s Threat Analysis Group...
You didn’t really think that the ransomware wave was coming to an end, did you? You may be tempted to...
Experts spotted a new Unix rootkit, called Caketap, that was used to steal ATM banking data. Mandiant researchers discovered a...
The UK’s Online Safety Bill, a landmark piece of legislation that that aims to regulate the country’s online content, has...
It’s been a long time coming. The worry over deepfake technology being used during times of major upheaval has been...
TIM Red Team Research (RTR) researchers discovered a new flaw on Ericsson Network Manager, aka Ericsson flagship network product. TIM...
The recently discovered Cyclops Blink botnet, which is believed to be a replacement for the VPNFilter botnet, is now targeting the ASUS...
Microsoft released an open-source tool to secure MikroTik routers and check for indicators of compromise for Trickbot malware infections. Microsoft...
The developer behind the popular “node-ipc” NPM package uploaded a destructive version to protest Russia’s invasion of Ukraine. RIAEvangelist, the...
This report discusses the technical capabilities of this Cyclops Blink malware variant that targets ASUS routers and includes a list...
The digital transformations that had enabled many enterprises to stay afloat amid the Covid-19 health crisis also brought about major...
The collective Anonymous and its affiliated groups continue to target the Russian government and private organizations. The collective Anonymous, and...
SolarWinds warns customers of potential cyberattacks targeting unpatched installs of its Web Help Desk (WHD) product. SolarWinds has published a...
Researchers have found that the Gh0stCringe RAT is infecting Microsoft SQL and MySQL, and seems to focus on servers with...
As more services move ever cloud-wards, so too do thoughts by attackers as to how best exploit them. With all...
The Security Service of Ukraine (SBU) announced the arrest of a “hacker” who helped Russian Army during the invasion. The...
Some don’t mind putting extra effort into making their crime appear as legitimate as possible by perpetuating more lies as...
Researchers uncovered a new Linux botnet, tracked as B1txor20, that exploits the Log4J vulnerability and DNS tunnel. Researchers from Qihoo...
Russian disinformation continues, this time it used a deepfake video of Zelenskyy inviting Ukrainians to ‘lay down arms.’ A deepfake...
The US Cybersecurity and Infrastructure Security Agency (CISA) added 15 new flaws to its Known Exploited Vulnerabilities Catalog. The U.S....
Every so often, fines hit the news as a result of phone/communication spam. Much of it targets older members of...
The US Federal Trade Commission (FTC) has announced that it took action against online customized merchandise platform CafePress over allegations...
FBI and CISA warn Russia-linked threats actors gained access to an NGO cloud after enrolling their own device in the...