The original threat actor behind the Octo malware family has released a new variant, Octo2, with enhanced stability for remote…
The RansomHub ransomware group tracked as Water Bakunawa, employs targeted spear-phishing to exploit the Zerologon vulnerability, allowing them to gain…
A campaign group set up by the children of subpostmasters who had their lives ruined by the Post Office scandal…
Ranveer Allahbadia, the popular figure behind the YouTube channels BeerBiceps and his main channel, became a victim of a cyberattack….
Kryptina RaaS, a free and open-source RaaS platform for Linux, initially struggled to attract attention. Still, after a Mallox affiliate’s…
Deep-learning models have found applications across various industries, from healthcare diagnostics to financial forecasting. However, their high computational demands often…
TeamTNT is targeting CentOS VPS clouds with SSH brute force attacks. It has uploaded a malicious script that disables security,…
Researchers are tracking a Russian threat actor deploying domains involved in crypto scams targeting the US Presidential Election and tech…
Sep 26, 2024Ravie LakshmananCloud Security / Cyber Espionage An advanced threat actor with an India nexus has been observed using…
C2 frameworks, crucial for post-exploitation operations, offer open-source alternatives to Cobalt Strike. They streamline the management of compromised systems, enable…
The Indian Computer Emergency Response Team (CERT-In) has reported multiple high-severity vulnerabilities in Apex Softcell’s mobile stock trading and back-office…
Data of 3,191 congressional staffers leaked in the dark web Pierluigi Paganini September 26, 2024 The personal information of over…











