Threat actors use ZIP files to weaponize them since they can easily convey malicious payloads within compressed archives, making it…
Last week marked the second anniversary of Russia’s full-scale invasion of Ukraine, a conflict that has been marked by multiple…
The ALPHV/BlackCat ransomware group has claimed responsibility for the cyberattack that targeted Optum, a subsidiary of UnitedHealth Group (UHG), causing…
Feb 29, 2024NewsroomRootkit / Threat Intelligence The notorious Lazarus Group actors exploited a recently patched privilege escalation flaw in the…
The latest TechTarget/Enterprise Strategy Group 2024 Technology spending intentions study shows that IT decision-makers are prioritising end user productivity tools….
The hacktivist group Ghosts of Palestine has claimed responsibility for the cyberattack on Israeli universities targeting prominent educational institutions. The…
A new Remote Access Trojan (RAT) named DashExe is advertised on underground hacking forums. The software is touted as a…
Here’s a look at the most interesting products from the past month, featuring releases from: Appdome, BackBox, Center for Internet…
A vulnerability in Facebook could have allowed an attacker to take over a Facebook account without the victim needing to…
Feb 29, 2024NewsroomLinux / Network Security Threat hunters have discovered a new Linux malware called GTPDOOR that’s designed to be…
London-based post-production company Dirty Looks has committed to moving all of its computing and storage workloads to Deep Green’s flagship…
Cybersecurity researchers unveiled a sophisticated scam operation, “Savvy Seahorse,” exploiting victims through advanced DNS manipulation techniques. This operation, active since…











