In the analysis by Trendmicro, they dissect the recent maneuvers of this advanced persistent threat (APT) actor, shedding light on…
Peach Sandstorm APT targets defense contractors globally via the FalseFont Backdoor, which can access remote systems and exfiltrate data. In this…
Hackers in India are using fake loan applications to target Android users to take advantage of the rising demand for…
In a brazen act of digital deception, the U.S. Securities and Exchange Commission's (SEC) official Twitter account, @SECGov, was compromised…
SMTP (Simple Mail Transfer Protocol) smuggling is a technique where attackers exploit the inconsistencies in how proxy servers or firewalls…
QakBot (aka Qbot) primarily targets financial institutions since it is a sophisticated banking trojan and malware. This malware can facilitate…
Recently, there has been a rise in incidences of hackers using "Remote Administration Tools" to control the infected system and…
AI (Artificial Intelligence) has significantly revolutionized software engineering with several advanced AI tools like ChatGPT and GitHub Copilot, which help…
The Federal Bureau of Investigation (FBI), the National Security Agency (NSA), and other co-authoring agencies have issued a warning that…
The Akira ransomware group, which first appeared in March 2023, has been identified as a serious threat to data security.…