Researchers Uncover Cicada3301 Ransomware Operations and Its Affiliate Program
Oct 17, 2024Ravie LakshmananRansomware / Network Security Cybersecurity researchers have gleaned additional…
Hackers Abuse EDRSilencer Tool to Bypass Security and Hide Malicious Activity
Oct 16, 2024Ravie LakshmananEndpoint Security / Malware Threat actors are attempting to…
New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT
Oct 15, 2024Ravie LakshmananMalware / Cybercrime Cybersecurity researchers have disclosed a new…
TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns
Oct 15, 2024Ravie LakshmananMobile Security / Financial Fraud New variants of an…
China Accuses U.S. of Fabricating Volt Typhoon to Hide Its Own Hacking Campaigns
China's National Computer Virus Emergency Response Center (CVERC) has doubled down on…
Nation-State Attackers Exploiting Ivanti CSA Flaws for Network Infiltration
Oct 14, 2024Ravie LakshmananNetwork Security / Vulnerability A suspected nation-state adversary has…
Cybercriminals Use Unicode to Hide Mongolian Skimmer in E-Commerce Platforms
Oct 10, 2024Ravie LakshmananCybercrime / Malware Cybersecurity researchers have shed light on…
CISA Warns of Threat Actors Exploiting F5 BIG-IP Cookies for Network Reconnaissance
Oct 11, 2024Ravie LakshmananVulnerability / Network Security The U.S. Cybersecurity and Infrastructure…
Microsoft Issues Security Update Fixing 118 Flaws, Two Actively Exploited in the Wild
Oct 09, 2024Ravie LakshmananVulnerability / Zero-Day Microsoft has released security updates to…