" This is type of the best occasion for driving conspiracy theory concepts as well as numerous anti-government as well… Read More
ThreatLabz exposed cyberespionage group Molerats that has been leveraging cloud services, such as Google Drive and Dropbox, to host payloads… Read More
ThreatLabz researchers observed several similarities in the C2 communication and .NET payload between this campaign and the previous campaigns attributed… Read More
Symantec revealed that the Iranian MuddyWater group has been targeting telecom operators, IT firms, and a utility company in the… Read More
Researchers suspect that the stealthy hacking group called WIRTE has been conducting attacks against government and diplomatic entities in the… Read More
Overview This February, during our hunting efforts for threat actors using VBS/VBA implants, we came across MS Excel droppers that… Read More
An analysis of the campaign, toolset, and methods employed by the adversary has also led the researchers to conclude with… Read More
The new variants appear in the form of an app that purports to install updates on the target’s phone, with… Read More
Sophos is warning against an evolved version of an Android spyware, allegedly used by an APT group called C-23, targeting… Read More
Researchers have found new evidence that suggests spyware made by an Israeli company that was recently blacklisted in the US… Read More
U.S. Deputy Treasury Secretary Wally Adeyemo will travel to the Middle East, where he will seek to build partnerships on… Read More
Proofpoint discovered that the MoleRATs hacking group, which has become active again after a two-month break, is infiltrating government networks… Read More
The APT group is capable of stealing victims’ system information, take screenshots, and write, move, or delete files. A subset… Read More
Researchers recently detected malicious activity targeting organizations in the Middle East and neighboring regions using spearphishing emails to distribute their… Read More
The LuckyMouse APT team planted backdoors and keyloggers to gain extended-term accessibility to federal government networks and then uploaded a… Read More
Saudi diplomats, Sikh separatists, and Indian small business executives have been between individuals specific by a group of employed hackers,… Read More