Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign
Jun 21, 2024NewsroomMalware / Threat Intelligence A previously undocumented Chinese-speaking threat actor…
How to Use Tines’s SOC Automation Capability Matrix
Created by John Tuckner and the team at automation and AI-powered workflow…
French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks
Jun 20, 2024NewsroomCyber Espionage / Hacking News State-sponsored actors with ties to…
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Jun 20, 2024NewsroomFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of…
New Rust-based Fickle Malware Uses PowerShell for UAC Bypass and Data Exfiltration
Jun 20, 2024NewsroomThreat Intelligence / Cybercrime A new Rust-based information stealer malware…
Kraken Crypto Exchange Hit by $3 Million Theft Exploiting Zero-Day Flaw
Jun 19, 2024NewsroomCybercrime / Crypto Security Crypto exchange Kraken revealed that an…
UNC3886 Uses Fortinet, VMware 0-Days and Stealth Tactics in Long-Term Spying
Jun 19, 2024NewsroomZero-Day Exploits / Cyber Espionage The China-nexus cyber espionage actor…
Cybercriminals Exploit Free Software Lures to Deploy Hijack Loader and Vidar Stealer
Jun 18, 2024NewsroomMalware / Cybercrime Threat actors are luring unsuspecting users with…
Signal Foundation Warns Against EU’s Plan to Scan Private Messages for CSAM
Jun 18, 2024NewsroomPrivacy / Encryption A controversial proposal put forth by the…


