Cybersecurity Blog
Unraveling Cyber Threats: Insights from Code Analysis | FortiGuard Labs
Affected platforms: All platforms where PyPI packages can be installedImpacted parties: Any individuals or institutions ...
From Water to Wine: An Analysis of WINELOADER | Splunk
The simplified version of this python tool is available here. IOC FileName SHA256 vcruntime140.dll ...
Russian Hacker Group ToddyCat Uses Advanced Tools for Industrial-Scale Data Theft
Apr 22, 2024NewsroomNetwork Security / Endpoint Security The threat actor known as ToddyCat has been observed using a ...
Malware Developer Lures Child Exploiters Into Honeytrap to Extort Them
Threat actors created a website to impersonate UsenetClub, a subscription service for “uncensored” access to ...
Pentera’s 2024 Report Reveals Hundreds of Security Events per Week, Highlighting the Criticality of Continuous Validation
Over the past two years, a shocking 51% of organizations surveyed in a leading industry report have been compromised by ...
MITRE Corporation Breached by Nation-State Hackers Exploiting Ivanti Flaws
Apr 22, 2024The Hacker NewsNetwork Security / Cybersecurity The MITRE Corporation revealed that it was the target of a ...
Researchers find dozens of fake E-ZPass toll websites after FBI warning
Cybersecurity researchers have found almost 30 phishing websites spoofing the electronic toll collection service E-ZPass ...
51% of enterprises experienced a breach despite large security stacks – Help Net Security
Threat actors are continuing to successfully breach across the entire attack surface and the stakes are only getting ...