LockBit Ransomware Group Demands $11 Million From Gov to Unlock Files
A devastating ransomware attack by Lockbit recently targeted the charming city of Calvià in Majorca, Spain, which is well-known for its tourism appeal. This incident…
A devastating ransomware attack by Lockbit recently targeted the charming city of Calvià in Majorca, Spain, which is well-known for its tourism appeal. This incident…
Beware! Your free download from the torrent sea might come with a hidden price: backdoor malware. Researchers at Kaspersky have discovered a widespread macOS malware…
A recent malware campaign dubbed “Commando Cat” has set its sights on exposed Docker API endpoints, posing a significant threat to cloud environments. This detailed…
It has been confirmed that AnyDesk, a renowned remote access software company headquartered in Germany, which boasts a staggering 170,000 customers worldwide, including big names…
In a decisive action, the U.S. The Department of Justice (DOJ) has disrupted a cyber operation by Chinese state-sponsored hackers. This operation, codenamed Volt Typhoon,…
Cloudflare discovered a threat actor on the self-hosted Atlassian server on November 23, 2023. The attack was launched with the use of one stolen access…
Despite the evolution of several tools and tactics, threat actors still go with the traditional approach to attack victims for malicious purposes. One such threat…
A new variant of VileRAT is being distributed through fake software pirate websites to infect Windows systems on a large scale. This Python-based VileRAT malware…
Recently, Cluster25, a threat intelligence firm, uncovered a spear-phishing campaign dubbed “The Bear and the Shell,” specifically targeting entities critical of the Russian government and…
Attackers continue to use compromised routers as malicious infrastructure to target government organizations in Europe and the Caucasus region. APT28 threat actors (also known as Sofacy,…
With the increasing complexity and sophistication of malware, traditional signature-based detection technologies are insufficient. Next-generation malware analysis is a significant cybersecurity breakthrough. Sophisticated malware can…
Attackers abuse trustworthy platforms for redirection, which involves the use of legitimate websites to redirect users to harmful URL destinations. In this ever-evolving world of cyber…