A recent malware campaign used a VBA macro in a Word document to download and execute a 64-bit Rust binary.…
Hackers often target CrushFTP servers as they contain sensitive data and are used for file sharing and storage. This makes…
DDoS attacks are a significant and growing risk that can overpower websites, crash servers, and block out authorized users with…
In a historic move, Microsoft has made the source code for MS-DOS 4.0, one of the most influential operating systems…
A new attack campaign has been discovered to be employed by the FROZEN#SHADOW, which utilized SSLoad malware for its operations…
Hackers exploit LOCKBIT Builder due to its versatility in creating customized ransomware payloads which enable them to tailor attacks to…
Attackers are employing evasion techniques to bypass detection and extend dwell time on compromised systems. This is achieved by targeting…
Cisco has released critical security updates to address multiple vulnerabilities in its Adaptive Security Appliance (ASA) devices and Firepower Threat…
Security researchers at Cisco Talos have uncovered a sophisticated cyber espionage campaign dubbed "ArcaneDoor" conducted by a state-sponsored threat actor…
This campaign is observed to be targeting multiple countries, including the U.S., Nigeria, Germany, Egypt, the U.K., Poland, the Philippines,…