Onenote Malware: Classification and Personal Notes
During the past 4 months Microsoft Onenote file format has been (ab)used as Malware carrier by different criminal groups. While...
During the past 4 months Microsoft Onenote file format has been (ab)used as Malware carrier by different criminal groups. While...
The Tallahassee Memorial HealthCare (TMH) hospital in Florida was forced to take offline its systems after a cyberattack. The Tallahassee...
As our latest APT Activity Report makes abundantly clear, the threat of cyberespionage and stealthy attacks remains very real The...
VMware ESXi hypervisors are the target of a new wave of attacks designed to deploy ransomware on compromised systems. "These...
A zero-day vulnerability affecting Fortra's GoAnywhere MFT managed file transfer application is being actively exploited in the wild. Details of...
Posted on February 3, 2023 Listen to this post On February 1, 2023, the Federal Trade Commission announced that it...
Brand impersonation is a particularly thorny problem for CISOs. Cybercriminals piggyback off a trusted brand to push scam lures through...
A recent attack where a threat group calling itself "Holy Souls" accessed a database belonging to satirical French magazine Charlie...
Threat actors started exploiting a critical Oracle E-Business Suite flaw, tracked as CVE-2022-21587, shortly after a PoC was published. Shadowserver...
Friday Squid Blogging: Studying the Colossal Squid A survey of giant squid science. As usual, you can also use this...
A Hacker’s Mind News A Hacker’s Mind will be published on Tuesday. I have done a written interview and a...
The increasing amounts of data generated by today’s modern enterprise continues to challenge organizations as they look to extract valuable...
An unknown threat actor has been quietly mining Monero cryptocurrency on open source Redis servers around the world for years,...
The challenges facing chief information security officers (CISOs) have evolved dramatically in the past decade. Today, they must align their security...
Cyberattacks are on the rise and enterprise defenders are protecting an increasingly expanding and complex attack surface. For many organizations,...