Cybersecurity Blog
Threat Actors Exploit CVE-2017-11882 To Deliver Agent Tesla
Microsoft Excel Infection Sequence Threat actors begin the infection sequence by distributing spam emails with malicious ...
Alert: Chinese-Speaking Hackers Pose as UAE Authority in Latest Smishing Wave
Dec 20, 2023NewsroomIdentity Theft / SMS Phishing The Chinese-speaking threat actors behind Smishing Triad have been ...
Anti-ransomware startup Halcyon lands fresh $40M tranche | TechCrunch
2023 proved to be a challenging year on the ransomware front after a brief lull in 2022. According to data from ...
Terrapin Attacks can Downgrade Security of OpenSSH Connections
The attack exploits weaknesses in the SSH transport layer protocol and encryption modes used by a majority of current ...
Ransomware trends and recovery strategies companies should know – Help Net Security
Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational ...
Behind the Scenes: JaskaGO’s Coordinated Strike on macOS and Windows
Executive summary In recent developments, a sophisticated malware stealer strain crafted in the Go programming language ...
3,500 Arrested in Global Operation HAECHI-IV Targeting Financial Criminals
Dec 20, 2023NewsroomFinancial Crime / Cyber Threat A six-month-long international police operation codenamed HAECHI-IV ...
New MetaStealer malvertising campaigns | Malwarebytes
MetaStealer is a popular piece of malware that came out in 2022, levering previous code base from RedLine. Stealers have ...