Phishing Campaigns Exploit RMM Tools to Sustain Remote Access
A sophisticated phishing operation in which attackers deploy remote monitoring and management (RMM) tools—ITarian (formerly Comodo), PDQ Connect, SimpleHelp, and...
Read more →A sophisticated phishing operation in which attackers deploy remote monitoring and management (RMM) tools—ITarian (formerly Comodo), PDQ Connect, SimpleHelp, and...
Read more →Sidewinder, a well-known advanced persistent threat (APT) group, has adapted its tactics to exploit the ongoing protests in Nepal, deploying...
Read more →In 2024, as the Russia-Ukraine war prolongs and military and economic cooperation between North Korea and Russia deepens, cyberspace has...
Read more →Burger King has invoked the Digital Millennium Copyright Act to force the removal of a security researcher’s blog post that...
Read more →A permissions issue in IBM QRadar SIEM could enable local privileged users to modify configuration files without proper authorization. Tracked...
Read more →A recently discovered flaw in LangChainGo, the Go implementation of the LangChain framework for large language models, permits attackers to...
Read more →The Kimsuky APT group has begun leveraging generative AI ChatGPT to craft deepfake South Korean military agency ID cards. Phishing...
Read more →Countries with most cyberattacks stopped highlighting global cyber defense efforts, including key regions in Asia-Pacific and North America. BlackNevas has...
Read more →The Federal Bureau of Investigation (FBI) has released a detailed flash advisory disclosing indicators of compromise (IOCs) and tactics used...
Read more →Analysis reveals that the developers behind the AppSuite-PDF and PDF Editor campaigns have abused at least 26 distinct code-signing certificates...
Read more →Microsoft has issued an urgent reminder to enterprise and educational institutions worldwide about the impending end of support for Windows...
Read more →A newly discovered ransomware group called Yurei has emerged with sophisticated encryption capabilities, targeting organizations through double-extortion tactics while leveraging...
Read more →