AgentTesla, a notorious information stealer, is observed spreading via CHM and PDF Files, which covertly harvest critical information from the victim's computer.The stealer has...
Whether you’re a large or small business, network security is something you can’t ignore.Threat actors can and will, infiltrate businesses of any size wreaking...
The European Telecommunications Standards Institute (ETSI) has uncovered a data breach in which threat actors obtained a database holding a list of portal users.The...
Prompt injection refers to a technique where users input specific prompts or instructions to influence the responses generated by a language model like ChatGPT.However,...
LinkedIn messages were used as a way to launch identity theft attacks in a malicious campaign that Cluster25 detected. They send messages from hacked accounts...
Microsoft has been closely monitoring the Octo Tempest, a significant financial threat organization. This threat group employs various strategies and TTPs for worldwide extortion, making...
Malware distribution methods have changed significantly in the cyber threat landscape. Data analysis shows that Microsoft Office document files are no longer the preferred...
ServiceNow has been alerted to a potential misconfiguration concern that might impact the security of its platform. The company is actively addressing the issue...
A security flaw called SQL injection has been uncovered in the D-Link DAR-7000 device.SQL injection is a malicious attack that exploits vulnerabilities in web...
A new web skimming campaign has been discovered, which targets multiple organizations in the food and retail industries. This campaign was unique as it...