Common Tactics Used by Threat Actors to Weaponize PDFs
In the vast and complex world of cybersecurity, danger often hides in the most unsuspecting corners, stalking stealthily where our...
Read more →In the vast and complex world of cybersecurity, danger often hides in the most unsuspecting corners, stalking stealthily where our...
Read more →AttackCrypt, an open-source “crypter,” was recently used by cybercriminals to hide malware binaries and avoid antivirus detection. A crypter is...
Read more →Zero Trust Data Access (ZTDA) constitutes a fundamental aspect of the wider Zero Trust security framework, which entails limiting data...
Read more →A honeypot is a trap on a network that lures and studies cyber-attack techniques of threat actors, alerting defenders to...
Read more →Freecycle, a popular online platform for giving away and receiving free items, reported a significant data breach. The Freecycle Network...
Read more →Adobe ColdFusion is a Java-based, commercial web app development platform using CFML for server-side programming. ColdFusion is primarily known for...
Read more →Multiple Information Disclosure vulnerabilities were discovered in the IBM Security Verify Information Queue, which can reveal several internal product details....
Read more →Apple launched the Security Research Device (SRD) program, enabling security researchers to examine the security features of a specially-built hardware...
Read more →A new sophisticated cyber espionage group named Earth Estries, which overlaps notorious threat group FamousSparrow, was unveiled. The group has...
Read more →Recently, threat actors have been utilizing brute force attacks to compromise exposed MSSQL databases to distribute the FreeWorld ransomware. This attack...
Read more →Recent reports suggest threat actors have used phishing emails to distribute fileless malware. The attachment consists of a .hta (HTML...
Read more →ReversingLabs spotted “VMConnect” in early August, a malicious supply chain campaign with two dozen rogue Python packages on PyPI. It’s...
Read more →