Oyster Backdoor Spreading via Trojanized Popular Software Downloads
Jun 21, 2024NewsroomMalware / Malvertising A malvertising campaign is leveraging trojanized installers…
Military-themed Email Scam Spreads Malware to Infect Pakistani Users
Jun 21, 2024NewsroomPhishing Attack / Email Security Cybersecurity researchers have shed light…
New Adware Campaign Targets Meta Quest App Seekers
Jun 22, 2024NewsroomPhishing Attack / Adware A new campaign is tricking users…
ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor
Jun 22, 2024NewsroomCyber Espionage / Threat Intelligence Russian organizations have been targeted…
U.S. Treasury Sanctions 12 Kaspersky Executives Amid Software Ban
Jun 22, 2024NewsroomNational Security / Cyber Espionage The U.S. Department of the…
Chinese Hackers Deploy SpiceRAT and SugarGh0st in Global Espionage Campaign
Jun 21, 2024NewsroomMalware / Threat Intelligence A previously undocumented Chinese-speaking threat actor…
How to Use Tines’s SOC Automation Capability Matrix
Created by John Tuckner and the team at automation and AI-powered workflow…
French Diplomatic Entities Targeted in Russian-Linked Cyber Attacks
Jun 20, 2024NewsroomCyber Espionage / Hacking News State-sponsored actors with ties to…
Researchers Uncover UEFI Vulnerability Affecting Multiple Intel CPUs
Jun 20, 2024NewsroomFirmware Security / Vulnerability Cybersecurity researchers have disclosed details of…