Threat actors are leveraging a newly discovered deepfake tool, ProKYC, to bypass two-factor authentication on cryptocurrency exchanges, which is designed…
In a new campaign that is aimed at users who speak Russian, the modular remote access tool (RAT) known as…
Honeypots, decoy systems, detect and analyze malicious activity by coming in various forms and can be deployed on cloud platforms…
Cluster Bravo, despite its brief initial activity, subsequently targeted 11 organizations in the same region, as researchers found that these…
The Iranian threat actor APT34, also known as GreenBug, has recently launched a new campaign targeting Iraqi government entities by…
Three Chinese state-backed threat groups, APT10, GALLIUM, and Stately Taurus, have repeatedly employed a modified version of the open-source network…
Web3 and DeFi have been appealing to many threat actors, and there has been a significant boost in heists that…
The recent campaign targeting the Czech Republic involves a malicious ZIP file that contains a decoy LNK file and a…
Amazon's e-commerce platforms and cloud services form a digital ecosystem requiring a strong cybersecurity framework. Amazon, which has a vast…
The Exodus Market, a haven for exiled criminals, has grown to become a significant player in the black market economy.…