Facebook Businesses Targeted in Infostealer Phishing Campaign
The threat actors deceive their victims by impersonating the legal teams of companies, well-known Web stores, and manufacturers.
The threat actors deceive their victims by impersonating the legal teams of companies, well-known Web stores, and manufacturers.
The $2.65B buy validates the growing importance of threat intelligence to enterprise security strategies.
The malware is a customized variant of the powerful open source XenoRAT information stealing malware often deployed by Kimsuky and…
CISA recommends disabling the legacy Cisco Smart Install feature after seeing it abused by threat actors in recent attacks to…
The state-sponsored Chinese threat actor gained access to three systems and stole at least some research data around computing and…
Government ministries keep falling victim to relatively standard-fare cyber-espionage attacks, like this latest campaign with hazy Chinese links.
Against a backdrop of political conflict, a years-long cyber espionage campaign in South Asia is coming to light.
The previously unknown threat actor uses tools similar to those used by North Korean APT groups, according to Cisco Talos.
Researchers believe the attacker is likely China-affiliated, since a previous version of the malware was used by a China nation-state…
Okta warns of an "unprecedented" spike in credential stuffing attacks targeting its identity and access management solutions, with some customer…