Researchers uncovered details about the Earth Centaur group that has been targeting transportation firms and government agencies associated with transportation.… Read More
A malicious campaign has been found using domain fronting to hide C2 traffic by leveraging a legitimate domain owned by… Read More
VECTR documentation can be found here: https://docs.vectr.ioVECTR Community Discord Channel: https://discord.gg/2FRd8zf728VECTR is a tool that facilitates tracking of your red… Read More
A threat actor, previously known for striking organizations in the energy and telecommunications sectors across the Middle East as early… Read More
The European Union has officially linked Russia to a hacking operation known as Ghostwriter that targets high-profile European Union officials,… Read More
Cybersecurity researchers reported a new Android banking trojan that hijacks user credentials and text messages to distribute fraudulent activities targeting… Read More
An unknown threat actor managed to control more than 27% of the entire Tor network exit capacity in early February… Read More
Many on-premises Microsoft Exchange servers are being patched, but Microsoft warns that its investigations have found multiple threats lurking on… Read More
Microsoft has updated its Defender Antivirus to mitigate the ProxyLogon flaw on vulnerable Exchange Servers automatically, while the Cybersecurity and… Read More
Customizable honeypots for monitoring network traffic, bots activities and usernamepassword credentials (DNS, HTTP Proxy, HTTP, HTTPS, SSH, POP3, IMAP, STMP,… Read More
CrowdStrike revealed that there has been a humongous increase in interactive intrusion activity. There has been a fourfold increase in… Read More
Compiled with a set of JavaScript functions, the novel toolkit dubbed LogoKit enables cybercriminals to change logos and text on… Read More
With a significant person base, it will make it fairly easy for cybercriminals to publish destructive browser extensions that execute… Read More
A nation-state actor recognised for its espionage strategies due to the fact 2012 is now utilizing coin miner strategies to… Read More
And as society continues to grapple with the impact of COVID-19, it is possible that these automated spear-phishing attacks will… Read More
More than 30 associates of an interregional legal team engaged in cloning and promoting credit history and payment cards of… Read More