Hackers trojanize PuTTY SSH client to backdoor media company
North Korean hackers are using trojanized versions of the PuTTY SSH client to deploy backdoors on targets' devices as part…
North Korean hackers are using trojanized versions of the PuTTY SSH client to deploy backdoors on targets' devices as part…
Security researchers have identified new cyber-espionage activity focusing on government entities in Asia, as well as state-owned aerospace and defense…
Ransomware gangs have been busy this week, launching attacks against NAS devices, one of the largest hotel groups, IHG, and…
The Lampion malware is being distributed in greater volumes lately, with threat actors abusing WeTransfer as part of their phishing…
A new version of the Bumblebee malware loader has been spotted in the wild, featuring a new infection chain that…
HP issued a security advisory alerting users about a newly discovered vulnerability in HP Support Assistant, a software tool that…
Chile's national computer security and incident response team (CSIRT) has announced that a ransomware attack has impacted operations and online services…
China-based threat actors have been targeting Australian government agencies and wind turbine fleets in the South China Sea by directing…
Microsoft has discovered a new malware used by the Russian hacker group APT29 (a.k.a. NOBELIUM, Cozy Bear) that enables authentication…
Threat actors are dumping the Cobalt Strike penetration testing suite in favor of similar frameworks that are less known. After…