North Korean Hackers Abuse Cloud-Based Services to Deploy Malware
ESET’s recent report details the activities of various advanced persistent threat (APT) groups from April to September 2024, highlighting key trends and developments observed during…
ESET’s recent report details the activities of various advanced persistent threat (APT) groups from April to September 2024, highlighting key trends and developments observed during…
Cybercriminals have launched a large-scale phishing attack using a new variant of Rhadamanthys Stealer, dubbed CopyRh(ight)adamantys, which targets individuals and organizations worldwide, falsely accusing them…
North Korean threat actors, likely associated with BlueNoroff, have launched multi-stage malware attacks targeting cryptocurrency businesses, expanding their toolkit to include RustDoor/ThiefBucket and RustBucket campaigns. …
MFA enhances the security of email accounts by requiring users to provide additional verification beyond just their password. Implementing MFA reduces the risk of unauthorized…
Multi-stage malware means sophisticated cyberattack strategies that evolve in several steps. Recent developments in multi-stage malware highlight the increasing sophistication of cyber threats. SentinelOne researchers…
Stealer malware is a type of malicious software designed to infiltrate computers and extract sensitive information. Once installed, it communicates with a command-and-control server operated…
October 2024 has been a productive month for Interactive malware analysis platform ANY.RUN, bringing a series of improvements aimed at enhancing threat detection and malware…
Hackers primarily target Windows systems due to their significant market share: Over 80% of desktop operating systems run Windows. Not only that even nearly 50%…
Cybercriminals are utilizing a sophisticated evasion strategy called ZIP file concatenation to specifically target Windows users. This method combines several ZIP files into a single…
Hackers target Cisco primarily due to its critical role in global network infrastructure and security. Cisco’s devices are essential for protecting sensitive data and communications…
Multiple critical vulnerabilities have been identified in HPE Aruba Access Points, potentially allowing attackers to execute remote code and compromise systems. These vulnerabilities affect both…
Cisco has disclosed multiple vulnerabilities impacting its Identity Services Engine (ISE) software. These vulnerabilities could allow authenticated, remote attackers to bypass authorization mechanisms or conduct…