Prometei Botnet Targets Linux Servers for Cryptocurrency Mining Operations
Unit 42 researchers from Palo Alto Networks have identified a renewed wave of attacks by the Prometei botnet, specifically targeting...
Read more →Unit 42 researchers from Palo Alto Networks have identified a renewed wave of attacks by the Prometei botnet, specifically targeting...
Read more →A malicious campaign tracked as Mocha Manakin has been identified employing the deceptive “paste-and-run” technique to trick unsuspecting users into...
Read more →A severe security vulnerability in the Insomnia API Client, a widely used tool by developers and security testers for interacting...
Read more →CyberArmor has uncovered a sophisticated phishing campaign exploiting Vercel, a widely used frontend hosting platform, to distribute a malicious variant...
Read more →A recent threat hunting session has revealed a sophisticated PowerShell script, named y1.ps1, hosted in an open directory on a...
Read more →A recent security analysis has revealed how a chain of misconfigurations in Microsoft Azure can allow attackers to gain complete...
Read more →The internet witnessed a new record in cyberattacks last month as Cloudflare, blocked the largest distributed denial-of-service (DDoS) attack ever...
Read more →A newly disclosed set of vulnerabilities in Versa Networks’ SD-WAN orchestration platform, Versa Director, with the flaws enabling authenticated attackers...
Read more →A new Android botnet malware named AntiDot has emerged as a formidable threat, granting cybercriminals unprecedented control over infected devices....
Read more →Oxford City Council has confirmed it was the target of a sophisticated cyberattack that resulted in the exposure of personal...
Read more →Zimperium zLabs has uncovered a highly advanced iteration of the GodFather Android banking malware, which employs a groundbreaking on-device virtualization...
Read more →Microsoft has announced a significant update to the security posture of its Windows 365 Cloud PCs, introducing new secure-by-default capabilities...
Read more →