X-Labs identified basic ransomware targeting Turkish businesses, delivered via PDF attachments in suspicious emails from the internet[.]ru domain. PDF links…
A Houthi-aligned group has been deploying Android surveillanceware called GuardZoo since October 2019 to target military personnel in the Middle…
Ransomware-as-a-service (RaaS) has evolved into sophisticated enterprise-like model. From 2022 to 2023, ransomware programs advertised on the dark web increased…
A new position paper argues that Privacy Enhancing Technologies (PET) used in Home Routing are making it difficult for law…
A malware campaign of huge magnitude, and perhaps run by just one group, is using artificially nested files for distribution…
Cyberespionage actors are increasingly using ransomware as a final attack stage for financial gain, disruption, or to cover their tracks,…
A recent rise in data breaches from illegal Chinese OTT platforms exposes that user information, including names and financial details,…
Hackers target vaults, buckets, and secrets to access some of the most classified and valuable information, including API keys, logins,…
Several phishing campaign kits have been used widely by threat actors in the past. One popular PhaaS (Phishing-as-a-Platform) was Caffeine,…
Hackers often attack online banking platforms, e-commerce portals, and payment systems for illicit purposes. Resecurity researchers have recently revealed that…