North Korean Hackers Targeting Crypto Experts with KANDYKORN macOS Malware

Nov 01, 2023NewsroomMalware / Cryptocurrency State-sponsored threat actors from the Democratic People’s Republic ...

.US Harbors Prolific Malicious Link Shortening Service – Krebs on Security

The top-level domain for the United States — .US — is home to thousands of newly-registered domains tied to a malicious ...

Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security

Palo Alto Networks (NASDAQ: PANW) announced on Tuesday that it has entered into a definitive agreement to acquire Dig ...

Over the Kazuar’s Nest: Cracking Down on a Freshly Hatched Backdoor Used by Pensive Ursa (Aka Turla)

Executive Summary While tracking the evolution of Pensive Ursa (aka Turla, Uroburos), Unit 42 researchers came across a ...

Applying ATT&CK Methodology to Hardware and Firmware – Eclypsium | Supply Chain Security for the Modern Enterprise

The rapid rise of hardware- and firmware-related attacks and supply chain threats has been one of the most significant ...

From Albania to the Middle East: The Scarred Manticore is Listening – Check Point Research

Key Findings Check Point Research (CPR) is monitoring an ongoing Iranian espionage campaign by Scarred Manticore, an ...

Turla Updates Kazuar Backdoor with Advanced Anti-Analysis to Evade Detection

Nov 01, 2023NewsroomCyber Threat / Malware The Russia-linked hacking crew known as Turla has been observed using an ...

Largest Indian Data Leak: 815 Million People’s COVID Test Data on Sale, Samples Verified

The dark web has turned out to be an unnerving market for the private COVID information of nearly 815 million citizens ...

1 562 563 564 565 566 567 568 569 570 571 572 697