Remcos RAT Distributed As UUEncoding (UUE) File To Steal Logins
Researchers identified a campaign distributing Remcos RAT, a Remote Access Trojan, where the attack uses phishing emails disguised as legitimate...
Read more →Researchers identified a campaign distributing Remcos RAT, a Remote Access Trojan, where the attack uses phishing emails disguised as legitimate...
Read more →Cybersecurity experts have identified a new type of malware called “Noodle RAT,” which Chinese-speaking hacker groups use to target Linux...
Read more →Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that...
Read more →The Mali GPU driver is a widely used Graphical Processing Unit for multiple devices, including Android and Linux. A new...
Read more →Officers have made two arrests in connection with using a “text message blaster,” believed to have been used to send...
Read more →AI SPERA, a leader in Cyber Threat Intelligence (CTI) solutions, announced that it has started selling its paid threat detection...
Read more →VPN apps for Android increase privacy and security over the internet since connection data is encrypted, consequently making it impossible...
Read more →A proof-of-concept (PoC) exploit has been released for a critical authentication bypass vulnerability in Veeam Backup Enterprise Manager. The vulnerability,...
Read more →Ransomware is used by hackers to abuse victims’ data, locking it until a ransom is paid. This method of cyber...
Read more →DuckDuckGo has unveiled a new feature, AI Chat, which offers users an anonymous way to access popular AI chatbots. This...
Read more →Researchers detected an attack involving a fake KMSPico activator tool, which delivered Vidar Stealer through several events. The attack leveraged...
Read more →Due to the growing popularity of Apple devices, cybercriminals are increasingly targeting iOS and macOS with malware. The App Store...
Read more →