PlugX Trojan Disguised as Legitimate Windows Debugger Tool in Latest Attacks
Feb 27, 2023Ravie LakshmananMalware / Cyber Attack The PlugX remote access trojan has been observed masquerading as an open source...
Category Added in a WPeMatico Campaign
Feb 27, 2023Ravie LakshmananMalware / Cyber Attack The PlugX remote access trojan has been observed masquerading as an open source...
Feb 27, 2023Ravie Lakshmanan The Dutch police announced the arrest of three individuals in connection with a "large-scale" criminal operation...
Feb 24, 2023Ravie LakshmananMobile Security / Firmware Google said it's working with ecosystem partners to harden the security of firmware...
Feb 24, 2023The Hacker NewsCybersecurity Webinar / SaaS Security Are you prepared to tackle the top SaaS challenges of 2023?...
Feb 24, 2023The Hacker NewsArtificial Intelligence / Cybersecurity The use of AI in cybersecurity is growing rapidly and is having...
Feb 24, 2023Ravie LakshmananCyber War / Cybersecurity The U.S. Cybersecurity and Infrastructure Security Agency (CISA) is urging organizations and individuals...
An investigation into data safety labels for Android apps available on the Google Play Store has uncovered "serious loopholes" that...
Feb 23, 2023Ravie LakshmananEndpoint Security / Cryptocurrency Trojanized versions of legitimate applications are being used to deploy evasive cryptocurrency mining...
Feb 23, 2023Ravie Lakshmanan Multiple threat actors have been observed opportunistically weaponizing a now-patched critical security vulnerability impacting several Zoho...
The (Other) Risk in Finance A few years ago, a Washington-based real estate developer received a document link from First...
Materials research organizations in Asia have been targeted by a previously unknown threat actor using a distinct set of tools....
A new backdoor associated with a malware downloader named Wslink has been discovered, with the tool likely used by the...
An active malware campaign has set its sights on Facebook and YouTube users by leveraging a new information stealer to...
Cybersecurity researchers are warning of "imposter packages" mimicking popular libraries available on the Python Package Index (PyPI) repository. The 41...
Apple has revised the security advisories it released last month to include three new vulnerabilities impacting iOS, iPadOS, and macOS....