Cybersecurity Blog
‘eXotic Visit’ Spyware Campaign Targets Android Users in India and Pakistan
Apr 10, 2024NewsroomMobile Security / Spyware An active Android malware campaign dubbed eXotic Visit has been ...
Raspberry Robin Returns: New Malware Campaign Spreading Through WSF Files
Apr 10, 2024NewsroomCyber Crime / Malvertising Cybersecurity researchers have discovered a new Raspberry Robin ...
Beware: GitHub’s Fake Popularity Scam Tricking Developers into Downloading Malware
Apr 10, 2024NewsroomSoftware Security / Supply Chain Attack Threat actors are now taking advantage of GitHub’s ...
New threat actor Starry Addax targets human rights defenders in North Africa
A new threat actor dubbed “Starry Addax” is targeting human rights activists associated with the Sahrawi Arab Democratic ...
Sidestepping SharePoint Security: Two New Techniques to Evade Exfiltration Detection | Varonis
Varonis Threat Labs discovered two techniques in SharePoint that allow users to circumvent audit logs and avoid ...
Research Unearths RUBYCARP’s Multi-Miner Assault on Crypto
A recent research study has shed light on the decade-long activities of a Romanian cyber threat group known as RUBYCARP, ...
Hands-on Review: Cynomi AI-powered vCISO Platform
The need for vCISO services is growing. SMBs and SMEs are dealing with more third-party risks, tightening regulatory ...
Researchers discover new ransomware gang ‘Muliaka’ attacking Russian businesses
A previously unknown ransomware gang has been attacking Russian businesses with malware based on the leaked source code ...