XMap is a fast network scanner designed for performing Internet-wide IPv6 & IPv4 network research scanning. XMap is reimplemented and… Read More
Three-quarters rely on traditional VPNs for remote access while a third also use Zero Trust as part of their remote… Read More
Blackberry revealed three phishing schemes by APT41 that were targeting multiple sectors in India using COVID-19-themed phishing baits. Some of the… Read More
The malicious code deployed by attackers disables the hostguard service, a Huawei Cloud Linux agent process that “detects security issues,… Read More
When this app is executed, it downloads and runs a malicious Python script. This malware, which Trend Micro has detected… Read More
Fake installers of popular software are being used to deliver malware onto victims’ devices. These lures trick users into opening… Read More
Once Cring has been executed in the system, it disables services and processes that might hinder its encryption routine. After… Read More
The attacker used publicly available file hosting services such as “archive.org”, “transfer.sh”, and "discord.com", to host the malware while hacked… Read More
Researchers at NC State created a toolkit dubbed iTimed, which builds atop an open-source reimplementation of the "unpatchable" checkm8 boot… Read More
APT-C-36 has been known to send phishing emails to various entities in South America using publicly available remote access tools… Read More
This cyberespionage campaign uses previously unidentified shellcode loaders, which we have named StealthVector and StealthMutant, and a backdoor, which we… Read More
The underrated threat of related-domain attacks can enable malicious actors to circumvent many advanced website protection mechanisms, according to researchers… Read More
Cyble announced that Kaustubh Medhe, former Assistant Vice President – Information Risk Management & Cybersecurity at Reliance Industries Group, has… Read More
A number of British universities have been awarded a grant to explore the security issues surrounding IoT and smart home… Read More
The malicious app abused sideloading flaws to load and start the Cinobi banking trojan. This is a new campaign from… Read More
Security researchers and bug bounty hunters can use WARCannon to non-invasively test regex patterns across the entire internet for corresponding… Read More