AgentTesla Stealer Delivered Via Weaponized PDF and CHM Files
AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the victim’s computer. The stealer has…
AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the victim’s computer. The stealer has…
Oct 16, 2023NewsroomVulnerability / Hacking Pro-Russian hacking groups have exploited a recently disclosed security vulnerability in the WinRAR archiving utility as part of a phishing…
Signal denies claims of an alleged zero-day flaw in its platform Pierluigi Paganini October 16, 2023 Encrypted messaging app Signal denied claims of an alleged…
Ransomware attacks have grown to be a serious concern for businesses of all sizes, with the potential to seriously harm the operations, finances, and reputation of…
By Ben Smith, Field Chief Technology Officer, NetWitness Vulnerability is a four-letter word in the world of cybersecurity, as one leading business application vendor learned…
A threat actor is using compromised Skype accounts to deliver the DarkGate malware to target organizations, Trend Micro researchers have warned. “Versions of DarkGate have…
Oct 16, 2023NewsroomMalware / Mobile Security The Android banking trojan known as SpyNote has been dissected to reveal its diverse information-gathering features. Typically spread via…
Two Australian academic researchers have devised a new cyber intrusion detection system that relies on AI to help unmanned military robots identify man-in-the-middle (MitM) cyberattacks.…
Organizational Data Security Strategy – Bring Your Own Key (Byok) By Chris Allen, Senior Solutions Architect, Cryptomathic. Cloud computing is now the norm. Up to…
The Kansas Supreme Court has initiated a transition to paper-based operations as they investigate a ransomware attack that has disrupted their electronic filing system. The…
A vulnerability affecting some industrial routers made by Chinese IoT and video surveillance product maker Milesight may have been exploited in attacks, according to exploit…
The cybersecurity landscape is always changing, and women are increasingly being given a platform to break down barriers and advance in an area that has…