Hackers Hide RMM Installs as Fake Chrome Updates and Teams Invites
New research from Red Canary and Zscaler shows phishing lures now drop RMM tools like ITarian and Atera, giving attackers...
Read more →New research from Red Canary and Zscaler shows phishing lures now drop RMM tools like ITarian and Atera, giving attackers...
Read more →Samsung has patched a serious security vulnerability that hackers were already using in live attacks against its Android devices. The...
Read more →Hackers leaked 600 GB of data linked to the Great Firewall of China, exposing documents, code, and operations. Full details...
Read more →In early September, Qrator Labs detected and mitigated one of the most significant L7 DDoS attacks seen this year, carried...
Read more →Okta Threat Intelligence exposes VoidProxy, a new PhaaS platform. Learn how this advanced service uses the Adversary-in-the-Middle technique to bypass...
Read more →New SEO poisoning campaign exposed! FortiGuard Labs reveals how attackers trick users with fake websites to deliver Hiddengh0st and Winos...
Read more →Scattered Lapsus$ Hunters, linked to the Jaguar Land Rover cyberattack, claims to shut down as experts suggest the group is...
Read more →A new report from Cofense reveals that cybercriminals are blending phishing and malware, including Muck Stealer, Info Stealer, ConnectWise RAT,...
Read more →US Senator Ron Wyden urges the FTC to investigate Microsoft after its software contributed to a major ransomware attack on...
Read more →A phishing scam is exploiting Google’s trusted AppSheet platform to bypass email filters. Learn how hackers are using legitimate tools...
Read more →LNER cyber attack exposes passenger contact details and journey data. No financial information or passwords were taken, but customers are...
Read more →A previously dormant macOS threat, ChillyHell, is reviving. Read how this malware can bypass security checks, remain hidden, and install...
Read more →