Evasive phishing mixes reverse tunnels and URL shortening services
Security researchers are seeing an uptick in the use of reverse tunnel services along with URL shorteners for large-scale phishing campaigns,…
Security researchers are seeing an uptick in the use of reverse tunnel services along with URL shorteners for large-scale phishing campaigns,…
GitLab has released a critical security update for multiple versions of its Community and Enterprise Edition products to address eight…
Researchers analyzing the leaked chats of the notorious Conti ransomware operation have discovered that teams inside the Russian cybercrime group…
A new Windows Search zero-day vulnerability can be used to automatically open a search window containing remotely-hosted malware executables simply by…
"Follina" vulnerability in Microsoft Support Diagnostic Tool (MSDT) affects all currently supported Windows versions and can be triggered via specially…
Vodafone is piloting a new advertising ID system called TrustPid, which will work as a persistent user tracker at the mobile…
EnemyBot, a botnet based on code from multiple malware pieces, is expanding its reach by quickly adding exploits for recently…
The malware’s abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and…
Proof-of-concept exploit code is now available online for a critical authentication bypass vulnerability in multiple VMware products that allows attackers…
New research into the inner workings of the stealthy BPFdoor malware for Linux and Solaris reveals that the threat actor behind it…