Cybersecurity Blog
New Snake Keylogger Variant Slithers Into Phishing Campaigns
The attack starts with a phishing email disguised as a fund transfer notification, with an attached Excel file named ...
FBI: RansomHub Ransomware Breached 210 Victims Since February 2024
The ransomware operation focuses on data theft extortion rather than encrypting files, with victims facing the threat of ...
Operation DevilTiger: APT-Q-12’s Shadowy Tactics and Zero-Day Exploits Unveiled
The QiAnXin Threat Intelligence Center has revealed the details of “Operation DevilTiger,” a cyber espionage ...
Suspected Espionage Campaign Delivers New Voldemort Malware
The campaign, which targeted organizations worldwide, involved impersonating tax authorities from various countries and ...
Godzilla Fileless Backdoors Targeting Atlassian Confluence
The Godzilla fileless backdoor relies on a complex series of actions, such as cryptographic operations, class loading, ...
US Offers $2.5 Million Reward for Hacker Linked to Angler Exploit Kit
The U.S. Department of State and the Secret Service are offering a reward of $2.5 million for information leading to the ...
Cybercriminals Capitalize on Travel Industry’s Peak Season
Cequence Security found that cyberattacks against the travel industry surge during holidays, with 91% of severe ...
‘Store Now, Decrypt Later’: US Leaders Prep for Quantum Cryptography Concerns
U.S. cybersecurity leaders are focusing on preparing for the potential risks posed by quantum cryptography tools that ...