The information that potentially could have been accessed in a limited number of accounts included system-generated notices and documents containing… Read More
The attacker used publicly available file hosting services such as “archive.org”, “transfer.sh”, and "discord.com", to host the malware while hacked… Read More
APT-C-36 has been known to send phishing emails to various entities in South America using publicly available remote access tools… Read More
This cyberespionage campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we… Read More
The malicious app abused sideloading flaws to load and start the Cinobi banking trojan. This is a new campaign from… Read More
BIOPASS RAT possesses features such as file system assessment, remote desktop access, file exfiltration, and shell command execution. It can… Read More
This time, PurpleFox EK is making use of WPAD domains to infect users. While a WPAD abuse attack is a… Read More
It is operated by a group tracked under the intrusion set "Water Roc". This group combines advanced techniques with legitimate… Read More
Most components of this ransomware attack mainly target Red Hat and CentOS Linux distributions; however, in some scripts, Debian-based Linux… Read More
Several positive steps continue to be taken by organizations such as the European Union and the U.S. FTC to curb… Read More
As Linux attracts more attention from malicious actors, researchers have seen threats evolving — abusing services like Ngrok and using… Read More