Balaji

Balaji

SquareX, Awarded Rising Star Category in CybersecAsia Readers’ Choice Awards 2024SquareX, Awarded Rising Star Category in CybersecAsia Readers’ Choice Awards 2024

SquareX, Awarded Rising Star Category in CybersecAsia Readers’ Choice Awards 2024

SquareX has been named a winner of the prestigious Rising Star category in CybersecAsia Readers' Choice Awards 2024 Awards, due…

8 months ago
Mastercard to Acquire Threat Intel Firm Recorded Future for $2.65 BillionMastercard to Acquire Threat Intel Firm Recorded Future for $2.65 Billion

Mastercard to Acquire Threat Intel Firm Recorded Future for $2.65 Billion

In a strategic move to bolster its cybersecurity capabilities, Mastercard has announced an agreement to acquire Recorded Future, a leading…

8 months ago
New Loki Backdoor Attacking macOS SystemsNew Loki Backdoor Attacking macOS Systems

New Loki Backdoor Attacking macOS Systems

Cody Thomas developed Apfell, an open-source macOS post-exploitation framework, in 2018 and evolved into Mythic, a cross-platform framework that addresses…

8 months ago
Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS TunnelingThreat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling

Threat Actors Using New Malware Toolkit That Involves IIS Backdoor, DNS Tunneling

The Iranian threat actor APT34, also known as GreenBug, has recently launched a new campaign targeting Iraqi government entities by…

8 months ago
Criminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global AudiencesCriminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global Audiences

Criminal IP Teams Up with IPLocation.io to Deliver Unmatched IP Solutions to Global Audiences

Criminal IP, a distinguished leader in Cyber Threat Intelligence (CTI) search engine developed by AI SPERA, announced that it has…

8 months ago
Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS AttackVulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

Vulnerabilities in IBM Products Let Attackers Exploit & Launch DOS Attack

IBM has issued a security bulletin addressing critical vulnerabilities in its MQ Operator and Queue Manager container images. These vulnerabilities,…

8 months ago
Growth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance SectorsGrowth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance Sectors

Growth of Web3 Fuled New Opportunities for Threat Actors to Attack Finance Sectors

Web3 and DeFi have been appealing to many threat actors, and there has been a significant boost in heists that…

8 months ago
New ManticoraLoader – Malware Attacking Citrix Users To Steal DataNew ManticoraLoader – Malware Attacking Citrix Users To Steal Data

New ManticoraLoader – Malware Attacking Citrix Users To Steal Data

Cyble Research & Intelligence Labs has recently found information about a new type of malware-as-a-service (MaaS) called 'ManticoraLoader' in some…

8 months ago
Head Mare Hacktivist Group Exploit WinRAR Vulnerability To Encrypt Windows And LinuxHead Mare Hacktivist Group Exploit WinRAR Vulnerability To Encrypt Windows And Linux

Head Mare Hacktivist Group Exploit WinRAR Vulnerability To Encrypt Windows And Linux

Head Mare, a Russian-focused hacktivist group, gained notoriety in 2023 by targeting organizations in Russia and Belarus as they employ…

8 months ago
Researchers Detailed Russian Hacktivist/State Hackers TacticsResearchers Detailed Russian Hacktivist/State Hackers Tactics

Researchers Detailed Russian Hacktivist/State Hackers Tactics

The People's Cyber Army of Russia is a Russian hacktivist group known for its strategic use of DDoS attacks and…

8 months ago