MoustachedBouncer Attacking Foreign Embassies Using NightClub
MoustachedBouncer, a cyberespionage group active since 2014, likely has performed ISP-level adversary-in-the-middle (AitM) attacks since 2020 to compromise its targets....
Read more →MoustachedBouncer, a cyberespionage group active since 2014, likely has performed ISP-level adversary-in-the-middle (AitM) attacks since 2020 to compromise its targets....
Read more →The Second quarter of 2023 has shown a significant increase in the overall cyber-threat risks. The blocking of unique web...
Read more →Ransomware groups often recycle tools, techniques, and procedures. Even some of them also provide playbooks for affiliates as well. Numerous...
Read more →The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and...
Read more →Infostealer malware is becoming extremely popular among cybercriminals, especially in the malware-as-a-service (MaaS) based sector. These kinds of malware remain...
Read more →In the last three years, hackers unknowingly seeking data or malware deployment have found a seemingly vulnerable virtual machine that...
Read more →The TargetCompany ransomware (aka Mallox, Fargo, and Tohnichi) is actively targeting the organizations that are using or running vulnerable SQL...
Read more →A new ransomware group known as ‘Rhysida’ has been operating since May 2023, posing a huge danger to the healthcare industry....
Read more →CODESYS, a widely-used integrated environment for controller programming, holds a strong presence in Operational Technology across diverse industries, such as:-...
Read more →RedHotel (TAG-22), a Chinese-state-sponsored threat group, is well-known for its persistence, prominence, operational intensity, and global reach. RedHotel is reported...
Read more →Researchers have discovered a Google Bard Ads campaign that is being used by cybercriminals on Facebook to impersonate well-known generative...
Read more →Gather Data Sampling (GDS) impacts select Intel CPUs, enabling attackers to deduce outdated data through malicious use of gather instructions....
Read more →