Mélofée: Researchers Uncover New Linux Malware Linked to Chinese APT Groups
An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at Linux servers. French...
An unknown Chinese state-sponsored hacking group has been linked to a novel piece of malware aimed at Linux servers. French...
A number of zero-day vulnerabilities that were addressed last year were exploited by commercial spyware vendors to target Android and...
Trojanized installers for the TOR anonymity browser are being used to target users in Russia and Eastern Europe with clipper...
Malware analysis is an essential part of security researcher's work. But working with malicious samples can be dangerous — it...
The emergence of smart mobility services and applications has led to a sharp increase in the use of APIs in...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The Information provided at the time of posting was detected as "Brute Ratel C4". Depending on when you are viewing...
A new North Korean nation-state cyber operator has been attributed to a series of campaigns orchestrated to gather strategic intelligence...
KARAKURT RANSOMWARE NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of...
Australian loan giant Latitude Financial Services (Latitude) is warning customers that its data breach is much more significant than initially...
Cybersecurity researchers have discovered a fundamental security flaw in the design of the IEEE 802.11 WiFi protocol standard, allowing attackers to...
A surge of trojanized Tor Browser installers targets Russians and Eastern Europeans with clipboard-hijacking malware that steals infected users' cryptocurrency...
Crown Resorts, Australia's largest gambling and entertainment company, has confirmed that it suffered a data breach after its GoAnywhere secure...
A new North Korean hacking group has been revealed to be targeting government organizations, academics, and think tanks in the...
Businesses rely on their end-users, but those same users often don't follow the best security practices. Without the right password...
RansomHouse Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Microsoft on Tuesday unveiled Security Copilot in preview, marking its continued push to embed AI-oriented features in an attempt to...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
Multiple threat actors have been observed using two new variants of the IcedID malware in the wild with more limited...
An advanced persistent threat (APT) group that has a track record of targeting India and Afghanistan has been linked to...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
U.S. President Joe Biden on Monday signed an executive order that restricts the use of commercial spyware by federal government...
A new phishing campaign has set its sights on European entities to distribute Remcos RAT and Formbook via a malware...