Research

Xmap – A Fast Network Scanner Designed For Performing Internet-wide IPv6 &Amp; IPv4 Network Research Scanning

XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning. XMap is reimplemented and… Read More

3 years ago

Menlo Security Research Shows 75% of Organizations Re-evaluating Security Strategy as Remote and Hybrid Working Set to Remain

Three-quarters rely on traditional VPNs for remote access while a third also use Zero Trust as part of their remote… Read More

3 years ago

Research Links Multiple Attack Campaigns to APT41 Group

Blackberry revealed three phishing schemes by APT41 that were targeting multiple sectors in India using COVID-19-themed phishing baits. Some of the… Read More

3 years ago

Actors Target Huawei Cloud Using Upgraded Linux Malware

The malicious code deployed by attackers disables the hostguard service, a Huawei Cloud Linux agent process that “detects security issues,… Read More

3 years ago

Mac Users Targeted by Trojanized iTerm2 App

When this app is executed, it downloads and runs a malicious Python script. This malware, which Trend Micro has detected… Read More

3 years ago

Attackers Use Fake Installers to Drop Malware and Open Doors for Cryptomining and Credential Theft

Fake installers of popular software are being used to deliver malware onto victims’ devices. These lures trick users into opening… Read More

3 years ago

Examining the Cring Ransomware Techniques

Once Cring has been executed in the system, it disables services and processes that might hinder its encryption routine. After… Read More

3 years ago

Water Basilisk Attack Campaign Uses New HCrypt Variant to Flood Victims with RAT Payloads

The attacker used publicly available file hosting services such as “archive.org”, “transfer.sh”, and "discord.com", to host the malware while hacked… Read More

3 years ago

Security bods boost Apple iPhone hardware attack research with iTimed toolkit

Researchers at NC State created a toolkit dubbed iTimed, which builds atop an open-source reimplementation of the "unpatchable" checkm8 boot… Read More

3 years ago

APT-C-36 Updates Its Long-term Spam Campaign Against South American Entities With Commodity RATs

APT-C-36 has been known to send phishing emails to various entities in South America using publicly available remote access tools… Read More

3 years ago

APT41 Identifies as Earth Baku in New Cyberespionage Campaign Employing ScrambleCross Backdoor

This cyberespionage campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we… Read More

3 years ago

Research: Hundreds of high-traffic web domains vulnerable to same-site attacks

The underrated threat of related-domain attacks can enable malicious actors to circumvent many advanced website protection mechanisms, according to researchers… Read More

3 years ago

Kaustubh Medhe joins Cyble as Head of Research and Intelligence

Cyble announced that Kaustubh Medhe, former Assistant Vice President – Information Risk Management & Cybersecurity at Reliance Industries Group, has… Read More

3 years ago

UK universities awarded funding for research into IoT, smart home security

A number of British universities have been awarded a grant to explore the security issues surrounding IoT and smart home… Read More

3 years ago

Cinobi Banking Trojan Targets Japanese Cryptocurrency Exchange Users via Malvertising Campaign

The malicious app abused sideloading flaws to load and start the Cinobi banking trojan. This is a new campaign from… Read More

3 years ago

Open source tool WARCannon simplifies web-wide vulnerability research

Security researchers and bug bounty hunters can use WARCannon to non-invasively test regex patterns across the entire internet for corresponding… Read More

3 years ago