The advanced persistent threat (APT) group, Arid Viper is back with a new campaign targeting Palestinian organizations and activists. The… Read More
Cybersecurity researchers on Tuesday took the wraps off a multi-stage espionage campaign targeting high-ranking government officials overseeing national security policy… Read More
Microsoft has disclosed details of a large-scale, multi-phase phishing campaign that uses stolen credentials to register devices on a victim's… Read More
McAfee addressed a high-severity security flaw in its McAfee Agent software for Windows that lets the hackers run arbitrary code… Read More
Microsoft on Wednesday disclosed details of a new security vulnerability in SolarWinds Serv-U software that it said was being weaponized… Read More
A new report suggests that North Korean hackers mooched off at least $400 million in cryptocurrencies through cyberattacks in 2021, which… Read More
Researchers have discovered a severe supply-chain attack that plants web skimmers on real-estate websites via… Hackers Exploit Cloud Video Platform… Read More
Russia’s Federal Security Service (FSB), the country’s principal security agency, disclosed that it arrested several members of the notorious REvil… Read More
Animoca Brands subsidiary and Sports nonfungible token (NFT) minting platform, Lympo, that mints for sports-related collectibles lost around $18.7 million… Read More
Operators associated with the Lazarus sub-group BlueNoroff have been linked to a series of cyberattacks targeting small and medium-sized companies… Read More
The goal is to evade detection by antivirus solutions which are more likely to catch commonly abused document formats and… Read More
Operators of the GootLoader campaign are setting their sights on employees of accounting and law firms as part of a… Read More
An Iranian state-sponsored actor has been observed scanning and attempting to abuse the Log4Shell flaw in publicly-exposed Java applications to… Read More
Threat actors are actively incorporating public cloud services from Amazon and Microsoft into their malicious campaigns to deliver commodity remote… Read More
Researchers have shed light on the tactics, techniques, and procedures embraced by an Indian-origin hacking group called Patchwork as part… Read More
Threat hunters have shed light on the tactics, techniques, and procedures embraced by an Indian-origin hacking group called Patchwork as… Read More