Threat actors use weaponized PDF files for initial infection. This is because they can be embedded with malicious code, PDF…
To raise awareness of the ALPHV Blackcat ransomware as a service (RaaS) that targets the US healthcare industry, the FBI, CISA,…
The current large surge in cyber threats has left many organizations grappling for security so ThreatHunter.ai is taking decisive action.…
PIKABOT is a polymorphic malware that constantly modifies its code, making it hard to recognize and easily bypasses the Endpoint…
Scattered Spider is a threat group responsible for attacking several organizations since May 2022 by using techniques like social engineering,…
Linux, traditionally viewed as a more secure operating system than Windows, has experienced a notable increase in malware attacks. In…
The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host. The campaign employed…
Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by…
Threat actors exploit Cisco AnyConnect vulnerabilities to gain unauthorized access to networks, compromise sensitive information, and potentially execute malicious activities. …
The Russian cyber espionage threat group "Turla APT group" was discovered to be using a new backdoor for its malicious…