A new zero-day Local Privilege Escalation (LPE) exploit has been put up for sale on a notorious hacker forum. This…
Researchers investigated a recent Agent Tesla malware campaign targeting US and Australian organizations, which used phishing emails with fake purchase…
Threat actors target home users with information-stealing malware like Vidar, StealC, and Lumma Stealer, which disguises the malware as pirated…
The professional and personal online spheres are merging as social media platforms like Facebook, LinkedIn, and WhatsApp are now commonly…
The research investigates the persistence and scale of AI package hallucination, a technique where LLMs recommend non-existent malicious packages. The…
Because of today's predominantly digital ecosystem, ransomware attacks pose a significant threat to organizations. These attacks can significantly affect those…
Security researchers have uncovered a sophisticated method of exploiting the Dynamic Host Configuration Protocol (DHCP) administrators group to escalate privileges…
In the vast expanse of the internet, where digital landscapes are shaped by code and data flows freely, lies a…
Group-IB has released its latest report, "Hi-Tech Crime Trends 2023/2024," highlighting critical global cyber threats. The report reveals a concerning…
Threat actors known as CACTUS orchestrated a sophisticated attack on two companies simultaneously, exploiting a software vulnerability within 24 hours…