Beware of Weaponized Office Documents that Deliver VenomRAT
Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware easily....
Read more →Since office documents are often used in business communications, hackers take advantage of this fact to disseminate malicious malware easily....
Read more →Two malicious npm packages were discovered on the npm open source package manager, which leverages GitHub to store stolen Base64-encrypted...
Read more →To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection...
Read more →VexTrio, a cybercrime syndicate with a history dating back to at least 2017, has been implicated in nefarious activities utilizing...
Read more →Hackers use supply chain attacks to breach a target by gaining access to and taking advantage of weaknesses in the...
Read more →In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has...
Read more →Hackers target cybersecurity professionals as successfully compromising their systems or gaining access to their credentials provides a gateway to valuable...
Read more →A PyPI malware author identified as “WS” was discovered by researchers to be covertly uploading malicious packages to PyPI that were impacting...
Read more →In a brazen act of digital deception, the U.S. Securities and Exchange Commission’s (SEC) official Twitter account, @SECGov, was compromised...
Read more →Threat actors have been using several methods for credential stealing, which varies based on the environment and infrastructure of the...
Read more →SSH or Secure Shell is a cryptographic network protocol that enables secure communication and remote access over an unsecured network. ...
Read more →Memcyco will showcase its solutions at Deloitte’s annual Cyber iCON event, demonstrating how organizations can build effective defenses to protect...
Read more →