New MacOS Malware Let Attackers Control The Device Remotely
A remote access trojan (RAT), HZ RAT, that has been attacking Windows-based devices since at least 2020, was recently upgraded...
Read more →A remote access trojan (RAT), HZ RAT, that has been attacking Windows-based devices since at least 2020, was recently upgraded...
Read more →Google has unveiled a new feature in its Password Manager that allows users to sync passkeys across multiple devices. This...
Read more →Mandiant exposed the activities of UNC1860, a sophisticated Iranian state-sponsored cyber group. This group, believed to be affiliated with Iran’s...
Read more →Operation Kaerb resulted in the arrest of 17 cybercriminals in Argentina, Chile, Colombia, Ecuador, Peru, and Spain. This international operation...
Read more →A notorious hacking group known as TeamTNT has resurfaced with a new campaign targeting Virtual Private Server (VPS) infrastructures running...
Read more →Ivanti has warned about a critical vulnerability in its Cloud Services Appliance (CSA) 4.6, which has been actively exploited in...
Read more →Vanilla Tempest is a ransomware group that has recently targeted U.S. healthcare organizations using a new ransomware strain. This group...
Read more →A C2 framework is an architecture that controls and maintains access to compromised systems. Its purpose is to allow you...
Read more →Supershell is a command-and-control (C2) remote control platform that operates through web services. It allows users to establish a reverse...
Read more →Fox Kitten (aka Pioneer Kitten or Parisite) is an Iranian cyber threat group that has been active since at least...
Read more →Phishing attacks are a type of social engineering scam where attackers trick victims into revealing sensitive information. In phishing attacks,...
Read more →Managed Services Providers (MSPs) are increasingly looking to provide cybersecurity services based on heightened demand from their current clients. Though...
Read more →