Freeze[.]rs Injector Weaponized for XWorm Malware Attacks
Aug 10, 2023THNMalware / Cyber Threat Malicious actors are using a legitimate Rust-based injector called Freeze[.]rs to deploy a commodity malware called XWorm in victim…
Aug 10, 2023THNMalware / Cyber Threat Malicious actors are using a legitimate Rust-based injector called Freeze[.]rs to deploy a commodity malware called XWorm in victim…
The Department for Work and Pensions (DWP) stands accused of encouraging the proliferation of zero-rights employees working in the public sector, after its latest set…
The first seven months of 2023 have seen a continued rapid evolution of the cybercrime ecosystem. Ransomware data exfiltration attacks, stealer log distribution, and new…
Skyhigh Security’s The Data Dilemma report underscores major paradigm shifts in cloud adoption and risk. By Rodman Ramezanian, Global Cloud Threat Lead, Skyhigh Security Over…
The well-known bulletproof hosting platform, Lolek Hosted, has been shut down by law enforcement officials from the United States and Poland to limit fraudsters’ access…
By Portia Cole, Emergent Threat Researcher, Avertium If the Security and Exchange Commission (SEC) has its way, it will soon do more than any other…
I hope you’ve been doing well! Hacker Summer Camp This is the first time I’m attending the Vegas conferences since the pandemic, and I’ve been…
An unfixed hardcoded encryption key flaw in Dell’s Compellent Integration Tools for VMware (CITV) allows attackers to decrypt stored vCenter admin credentials and retrieve the…
Controlling Cyber Risks and Fraud by Risk Assessment By Hakan Kantas, Senior IT Director We are trying to protect all the Internet connected systems, users,…
By Dotan Nahum, Head of Developer-First Security, Check Point Software Technologies What Will Cybersecurity Jobs Look Like in 2028? Macroeconomic turmoil, the Great Resignation, and…
Aug 10, 2023THNMalware / Cyber Threat A new information malware strain called Statc Stealer has been found infecting devices running Microsoft Windows to siphon sensitive…
Most modern-day threats are evolving and can now morph and adapt into severe cyber attacks capable of breaching the most secure organizations. One such threat…