The threat actors have been spotted increasingly depending on Remote Management and Monitoring (RMM) tools, which resulted in a relatively botched Hive…
Fortinet FortiOS has been discovered with Cross-Site Scripting (XSS) and Cross-Site Request Forgery (CSRF) vulnerabilities, which threat actors can use…
The Canadian government, banking, and transportation industries have recently been the targets of many distributed denial of service (DDoS) attacks.…
Ransomware is a universal threat to enterprises, targeting anyone handling sensitive data when profit potential is high. A new ransomware…
According to recent reports, a threat actor known as Storm-0324 has been using email-based initial infection vectors to attack organizations.…
In recent years, Linux systems gained prominence among diverse threat actors, with more than 260,000 unique samples emerging in H1…
Cybersecurity researchers at Symantec's Threat Hunter Team recently discovered that the Redfly threat actor group used ShadowPad Trojan to breach…
The Ballistic Bobcat is an Iran-aligned APT group, and initially, about two years ago, cybersecurity researchers at ESET tracked this…
Storm-0558, a threat actor based in China, has recently gained access to a Microsoft account consumer key. This has allowed…
The АРТ28 hacking group, suspected to have ties to Russian special services, has made an audacious attempt to breach the…