The CISA, FBI, and NSA released a joint advisory that warns critical infrastructure entities as well as the U.S. food… Read More
Unit 42 discovered hackers exploiting an open-source service called Interactsh; the tool generates desired domain names to help users test whether… Read More
Iran-linked hackers were found conducting extensive password spraying attacks against Office 365 accounts of defense technology and global maritime firms… Read More
Apache, the open-source cross-platform web server software, rolled out patches to fix two security vulnerabilities that were being abused by… Read More
Google warned against phishing attempts by APT28 impacting nearly 14,000 Gmail users, especially activists, journalists, and government officials as they… Read More
A cyberespionage operation by MalKamak, an Iran-based hacker group, is targeting aerospace and telecom firms based in the Middle East,… Read More
FamousSparrow, a new entrant to the cyberespionage space, is reportedly spying on users across multiple sectors, including government, engineering, legal,… Read More
Hackers were found disguising as various ministries in a phishing scheme targeting the government departments of at least seven countries… Read More
Researchers highlighted a new phishing email campaign, involving a new Dridex variant, that uses a specially crafted Excel document as… Read More
Lacework is warning of new threats from PYSA ransomware actors who just added capabilities to target Linux systems with ChaChi… Read More
Security analysts have used Incident Response (IR) and shared intelligence together for analyzing Sodinokibi ransomware’s behavior and offered a similar… Read More
Trend Micro found that around 13 million malware attacks targeted Linux-based cloud environments, with ransomware and coin miners accounting for… Read More
According to Mandiant, Chinese cyberespionage group UNC215 impersonated Iranian threat actors to target Israeli organizations in a campaign that began… Read More
A cybersecurity researcher recently spotted threat actors actively trying to exploit Microsoft Exchange servers by targeting ProxyShell vulnerabilities. The newly… Read More
Experts uncovered an attack campaign by BazaLoader operators. These attacks are tricking users into calling a particular phone number, an… Read More
A new research attack method demonstrated that replacing up to 50% of neurons in the AlextNet model with malware can… Read More