Cybersecurity Blog
Autodesk hosting PDF files used in Microsoft phishing attacks | Netcraft
Autodesk is hosting malicious PDF files that lead phishing attack victims to have their Microsoft login credentials ...
ThreatLocker Raises $115M in Series D Funding
ThreatLocker, an Orlando, FL-based global cybersecurity company that offers a Zero Trust endpoint security solution, ...
Researchers Sinkhole PlugX Malware Server With 2.5 Million Unique IPs
Researchers have sinkholed a command and control server for a variant of the PlugX malware and observed in six months ...
Hackers Exploiting WP-Automatic Plugin Bug to Create Admin Accounts on WordPress Sites
Apr 26, 2024NewsroomThreat Intelligence / Cyber Attack Threat actors are attempting to actively exploit a critical ...
North Korea’s Lazarus Group Deploys New Kaolin RAT via Fake Job Lures
Apr 25, 2024NewsroomMalware / Cyber Threat The North Korea-linked threat actor known as Lazarus Group employed its ...
Network Threats: A Step-by-Step Attack Demonstration
Follow this real-life network attack simulation, covering 6 steps from Initial Access to Data Exfiltration. See how ...
DOJ Arrests Founders of Crypto Mixer Samourai for $2 Billion in Illegal Transactions
Apr 25, 2024NewsroomCryptocurrency / Cybercrime The U.S. Department of Justice (DoJ) on Wednesday announced the arrest ...
Black Hat SEO Leveraged to Distribute Malware
How It Works The sequence begins with threat actors creating a fake site on a web hosting service, which remains ...