Security Brief: TA571 Delivers IcedID Forked Loader | Proofpoint US

What happened  Proofpoint researchers identified TA571 delivering the Forked variant of IcedID in two campaigns on 11 ...

North Korean Hackers Targeting Crypto Experts with KANDYKORN macOS Malware

Nov 01, 2023NewsroomMalware / Cryptocurrency State-sponsored threat actors from the Democratic People’s Republic ...

.US Harbors Prolific Malicious Link Shortening Service – Krebs on Security

The top-level domain for the United States — .US — is home to thousands of newly-registered domains tied to a malicious ...

Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security

Palo Alto Networks (NASDAQ: PANW) announced on Tuesday that it has entered into a definitive agreement to acquire Dig ...

Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla)

Executive Summary While tracking the evolution of Pensive Ursa (aka Turla, Uroburos), Unit 42 researchers came across a ...

Applying ATT&CK Methodology to Hardware and Firmware – Eclypsium | Supply Chain Security for the Modern Enterprise

The rapid rise of hardware- and firmware-related attacks and supply chain threats has been one of the most significant ...

From Albania to the Middle East: The Scarred Manticore is Listening – Check Point Research

Key Findings Check Point Research (CPR) is monitoring an ongoing Iranian espionage campaign by Scarred Manticore, an ...

Turla Updates Kazuar Backdoor with Advanced Anti-Analysis to Evade Detection

Nov 01, 2023NewsroomCyber Threat / Malware The Russia-linked hacking crew known as Turla has been observed using an ...

1 521 522 523 524 525 526 527 528 529 530 531 656