In 2021, UNC3886, a suspected China nexus cyber espionage actor, was found to be targeting strategic organizations on a large…
Stuxnet, a complex worm discovered in 2010, targeted Supervisory Control and Data Acquisition (SCADA) systems used in industrial facilities. By…
Fake websites of authoritative and popular companies claiming to be genuine sites make users believe that the site belongs to…
Memory corruption lets attackers hijack control flow, execute code, elevate privileges, and leak data. ARM's Memory Tagging Extension (MTE) aims…
A Pakistani threat actor group, Cosmic Leopard, has been conducting a multi-year cyber espionage campaign named Operation Celestial Force, targeting…
Attackers behind Spinning YARN launched a new cryptojacking campaign targeting publicly exposed Docker Engine hosts by using new binaries chkstart…
Researchers have identified a sophisticated cyberattack orchestrated by the notorious Kimsuky threat group. The group has been exploiting a known…
Cleveland City Hall and Erieview offices will remain closed for a second consecutive day, June 11, as officials continue investigating a significant “cyber event” that has disrupted city operations. A…
Hackers utilize MSC or Microsoft Management Console files in themed attack campaigns as these files contain commands and scripts that…
Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious…