8220 Gang Exploits Oracle WebLogic Server Flaws for Cryptocurrency Mining
Jun 28, 2024NewsroomMalware / Cryptocurrency Security researchers have shed more light on…
Kimsuky Using TRANSLATEXT Chrome Extension to Steal Sensitive Data
Jun 28, 2024NewsroomCyber Espionage / Cyber Attack The North Korea-linked threat actor…
Rust-Based P2PInfect Botnet Evolves with Miner and Ransomware Payloads
The peer-to-peer malware botnet known as P2PInfect has been found targeting misconfigured…
New Credit Card Skimmer Targets WordPress, Magento, and OpenCart Sites
Jun 26, 2024NewsroomWeb Skimming / Website Security Multiple content management system (CMS)…
New Attack Technique Exploits Microsoft Management Console Files
Jun 25, 2024NewsroomVulnerability / Threat Detection Threat actors are exploiting a novel…
Oyster Backdoor Spreading via Trojanized Popular Software Downloads
Jun 21, 2024NewsroomMalware / Malvertising A malvertising campaign is leveraging trojanized installers…
Military-themed Email Scam Spreads Malware to Infect Pakistani Users
Jun 21, 2024NewsroomPhishing Attack / Email Security Cybersecurity researchers have shed light…
New Adware Campaign Targets Meta Quest App Seekers
Jun 22, 2024NewsroomPhishing Attack / Adware A new campaign is tricking users…
ExCobalt Cyber Gang Targets Russian Sectors with New GoRed Backdoor
Jun 22, 2024NewsroomCyber Espionage / Threat Intelligence Russian organizations have been targeted…