Ditch The Cloud Security Labels to Nail Detection and Response
Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and…
Today’s cloud security categories don’t do practitioners any favors when it comes to identifying the key requirements for detection and…
A new malicious campaign is using a legitimate but old and vulnerable Avast Anti-Rootkit driver to evade detection and take…
The suspect, tracked as UNC5537, allegedly bragged about hacking several Snowflake victims on Telegram, drawing attention to himself.
A malicious campaign targeting Android devices worldwide utilizes thousands of Telegram bots to infect devices with SMS-stealing malware and steal…
The French police and Europol are pushing out a "disinfection solution" that automatically removes the PlugX malware from infected devices…
The purported metadata for each these containers had embedded links to malicious files.
LastPass is warning of a malicious campaign targeting its users with the CryptoChameleon phishing kit that is associated with cryptocurrency…
The U.S. Department of Health and Human Services (HHS) warns that hackers are now using social engineering tactics to target…
The Water Hydra cyberattacker group is one adversary using the zero-days to get past built-in Windows protections.
The attack, associated with Shuckworm, employs TTPs observed in prior campaigns against the Ukrainian military, predominantly using PowerShell.