Hackers start using Havoc post-exploitation framework in attacks
Security researchers are seeing threat actors switching to a new and open-source command and control (C2) framework known as Havoc…
Security researchers are seeing threat actors switching to a new and open-source command and control (C2) framework known as Havoc…
The authentication bypass used by the Nobelium group, best known for the supply chain attack on SolarWinds, required a massive,…
Microsoft says apps using DirectX are crashing on Windows systems with outdated Intel drivers after installing November 2022 cumulative updates.…
A campaign operated by Russian threat actors uses fake job offers to target Eastern Europeans working in the cryptocurrency industry,…
Security researchers have discovered four malicious Dota 2 game mods that were used by a threat actor to backdoor the players' systems.…
A new QBot malware campaign dubbed "QakNote" has been observed in the wild since last week, using malicious Microsoft OneNote'…
A new hacking campaign exploits Sunlogin flaws to deploy the Sliver post-exploitation toolkit and launch Windows Bring Your Own Vulnerable…
An ongoing Google ads malvertising campaign is spreading malware installers that leverage KoiVM virtualization technology to evade detection when installing…
Security researchers warn that hackers may start using Microsoft Visual Studio Tools for Office (VSTO) more often as method to…
A new cyber espionage campaign dubbed 'No Pineapple!' has been attributed to the North Korean Lazarus hacking group, allowing the…