Recent research has uncovered a new strain of malware developed for Android devices, initially misidentified as TgToxic. Despite sharing some…
Researchers uncovered two previously unknown endpoints with older Cortex XDR agents that used to test an AV/EDR bypass tool were…
The Phish, 'n' Ships fraud operation leverages, compromised websites to redirect users to fake online stores, which, optimized for search…
Singapore’s government has instructed internet service providers to block access to websites deemed “inauthentic,” which are believed to be part…
The sophisticated ransomware group Dark Angels, active since 2022, targets large companies for substantial ransom payments by employing third-party ransomware…
North Korean IT workers, disguised as non-North Koreans, infiltrate various industries to generate revenue for their regime, evading sanctions and…
Researchers are tracking a Russian threat actor deploying domains involved in crypto scams targeting the US Presidential Election and tech…
The Russian ransomware group Key Group, active since early 2023, is targeting organizations globally, as their modus operandi involves encrypting…
CosmicBeetle, a threat actor specializing in ransomware, has recently replaced its old ransomware, Scarab, with ScRansom, a custom-built ransomware that…
CAMO, or Commercial Applications, Malicious Operations, highlights attackers' increasing reliance on legitimate IT tools to bypass security defenses, which can…