Phishing attackers employed an HTML smuggling technique to deliver a malicious payload, as the attack chain started with a phishing…
The RomCom malware family, particularly its SnipBot variant, has evolved into a sophisticated threat capable of ransomware, extortion, and targeted…
UNC2970, a North Korean cyber espionage group, used customized SumatraPDF trojans to deliver MISTPEN backdoors to victims through phishing emails…
Zoom is a widely used videotelephony software used for virtual meetings, and its wide audience base attracts the hackers most.…
Adversaries are employing Large Language Models to generate malicious code, delivered via phishing emails, for downloading diverse payloads, including Rhadamanthys,…
Threat actors often attack cloud services for several illicit purposes. Google Cloud is targeted due to its extensive and powerful…
Sticky Werewolf, a cyber threat group, has shifted its targeting strategy from sending phishing emails with download links to malicious…
Phishing attackers are distributing malicious HTML files as email attachments, containing code designed to exploit users by prompting them to…
A new RAT malware has been discovered to be targeting Android devices. This malware is capable of executing additional commands…
Strelastealer malware has been found to be distributed in large-scale campaigns that have currently impacted over 100 organizations across the…