Leveraging DNS Tunneling for Tracking and Scanning

Threat actors are using DNS tunneling as a means to scan for network vulnerabilities and check the success of phishing ...

INC Ransomware Source Code Selling on Hacking Forums for $300,000

The source code of the INC ransomware-as-a-service (RaaS) operation, which has targeted organizations like Xerox ...

VMware Patches Severe Security Flaws in Workstation and Fusion Products

Multiple security flaws have been disclosed in VMware Workstation and Fusion products that could be exploited by threat ...

Insider Threats Maintain a Rising Trend

Insider threats, including dishonest actions to obtain benefits through theft or deception, have seen a significant rise ...

Southeast Asian Scam Syndicates Stealing $64 Billion Annually, Researchers Find

Researchers have found that Southeast Asian scam syndicates are stealing an estimated $64 billion annually through ...

New Chrome Zero-Day Vulnerability CVE-2024-4761 Under Active Exploitation

Google on Monday shipped emergency fixes to address a new zero-day flaw in the Chrome web browser that has come under ...

Cyber Insurers Pledge to Help Reduce Ransom Payments

The UK’s NCSC and major insurance associations have partnered to help reduce the profitability of ransomware ...

Why Tokens are Like Gold for Opportunistic Threat Actors

Tokens are valuable assets for threat actors, as they can be easily obtained through various attack methods and provide ...

1 203 204 205 206 207 208 209 210 211 212 213 661