North Korea actors use OtterCookie malware in Contagious Interview campaign
North Korea actors use OtterCookie malware in Contagious Interview campaign Pierluigi Paganini December 28, 2024 North Korea-linked threat actors are...
Read more →North Korea actors use OtterCookie malware in Contagious Interview campaign Pierluigi Paganini December 28, 2024 North Korea-linked threat actors are...
Read more →Dec 28, 2024Ravie LakshmananVulnerability / Threat Intelligence A high-severity flaw impacting select Four-Faith routers has come under active exploitation in...
Read more →The White House has confirmed that a ninth U.S. telecommunications company has fallen victim to the ‘Salt Typhoon’ campaign, a...
Read more →A White House official has added a ninth U.S. telecommunications company to the list of telecoms breached in a Chinese...
Read more →Dec 27, 2024Ravie LakshmananCryptocurrency / Cyber Espionage North Korean threat actors behind the ongoing Contagious Interview campaign have been observed...
Read more →A critical vulnerability, CVE-2024-3393, has been identified in the DNS Security feature of Palo Alto Networks’ PAN-OS software. This flaw...
Read more →The recent discovery of the NjRat 2.3D Professional Edition on GitHub has raised alarms in the cybersecurity community. This notorious...
Read more →Palo Alto Networks reported the Contagious Interview campaign in November 2023, a financially motivated attack targeting various organizations, unlike typical...
Read more →Palo Alto Networks is warning that hackers are exploiting the CVE-2024-3393 denial of service vulnerability to disable firewall protections by...
Read more →Researchers observed Lumma Stealer activity across multiple online samples, including PowerShell scripts and a disguised EXE installer, as analysis revealed...
Read more →Volkswagen Data Leak Exposes Information of Over 800,000 Electric Vehicle Owners Volkswagen (VW), one of the most well-known automobile manufacturers...
Read more →At least five Chrome extensions were compromised in a coordinated attack where a threat actor injected code that steals sensitive information...
Read more →