Fake Copyright Infringement Emails Spread Rhadamanthys
Attackers are triggering victims' deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents.
Attackers are triggering victims' deep-seated fear of getting in trouble in order to spread the sophisticated stealer across continents.
A recently disclosed Microsoft SharePoint remote code execution (RCE) vulnerability tracked as CVE-2024-38094 is being exploited to gain initial access…
The threat actors deceive their victims by impersonating the legal teams of companies, well-known Web stores, and manufacturers.
The Russian-backed group is using a novel access vector to harvest victim data and compromise devices in a large-scale intelligence-gathering…
The "Code-on-Toast" supply chain cyberattacks by APT37 delivered data-stealing malware to users in South Korea who had enabled Toast pop-up…
Zero-Trust Endpoint Security: How a Preventive Approach Can Limit Your Endpoint Attack Surface Endpoint security has become more critical than…
Hackers breached ESET's exclusive partner in Israel to send phishing emails to Israeli businesses that pushed data wipers disguised as…
A tool for red-team operations called EDRSilencer has been observed in malicious incidents attempting to identify security tools and mute…
1) The Reality of Cybersecurity Threats and Response As technology develops and digitalization progresses, cybersecurity threats are becoming increasingly diverse…
Over the weekend, Google removed Kaspersky's Android security apps from the Google Play store and disabled the Russian company's developer…