The malware, termed Migo by the creators, attempts to infiltrate Redis servers to mine cryptocurrency on the Linux host. The campaign employed…
Ransomware utilizes living-off-the-land tools in Windows attacks for stealth and evasion. They can blend in with normal system activities by…
Threat actors exploit Cisco AnyConnect vulnerabilities to gain unauthorized access to networks, compromise sensitive information, and potentially execute malicious activities. …
The Russian cyber espionage threat group "Turla APT group" was discovered to be using a new backdoor for its malicious…
Thorough, independent tests are vital as cybersecurity leaders and their teams evaluate vendors’ abilities to guard against increasingly sophisticated threats…
A recent massive operation by INTERPOL, which happens to be the biggest international police organization in the world, has successfully…
A new large-scale campaign named "ApateWeb '' has been discovered, which uses over 130,000 domains to deliver scareware, potentially unwanted…
To maintain access to compromised networks, hackers use specialized hacking tools. Such tools help the threat actors evade the detection…
In the murky depths of the digital world lurks a cunning predator – Parrot TDS, a cyber campaign that has…
Google Chrome has released its stable channel update version 20.0.6099.234 for Mac, 120.0.6099.224 for Linux, and 120.0.6099.224/225 for Windows. However,…