Autodesk hosting PDF files used in Microsoft phishing attacks | Netcraft

Autodesk is hosting malicious PDF files that lead phishing attack victims to have their Microsoft login credentials ...

ThreatLocker Raises $115M in Series D Funding

ThreatLocker, an Orlando, FL-based global cybersecurity company that offers a Zero Trust endpoint security solution, ...

Researchers Sinkhole PlugX Malware Server With 2.5 Million Unique IPs

Researchers have sinkholed a command and control server for a variant of the PlugX malware and observed in six months ...

Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites

Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical ...

North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures

Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus Group employed its ...

Network Threats: A Step-by-Step Attack Demonstration

Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how ...

DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions

Apr 25, 2024NewsroomCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) on Wednesday announced the arrest ...

Black Hat SEO Leveraged to Distribute Malware

How It Works The sequence begins with threat actors creating a fake site on a web hosting service, which remains ...

1 271 272 273 274 275 276 277 278 279 280 281 697