Artificial Bat Loader Malware Spreads Extensively Via Drive-by Download Attacks
July 03, 2024NewsroomMalware / SEO Poisoning A loader-as-a-service (LaaS) known as Artificial Bat has emerged as one of the most...
July 03, 2024NewsroomMalware / SEO Poisoning A loader-as-a-service (LaaS) known as Artificial Bat has emerged as one of the most...
July 03, 2024Media RoomMalware / Search Engine Optimization Corruption The loader-as-a-service (LaaS) called DeceptiveMoth has emerged as one of the...
Jul 03, 2024NewsroomCyber Intrusion / Malware A team of cybersecurity researchers has brought to light an intrusion initiative that is...
Jul 03, 2024NewsroomMalware / Threat Intelligence An South Korean company specializing in enterprise resource planning (ERP) had its server breached...
Jul 02, 2024NewsroomDigital Regulation / Tech News Meta's choice to introduce an ad-free membership in the European Union (E.U.) has...
Jul 02, 2024NewsroomCyber Espionage / Vulnerability An espionage group with ties to China called Velvet Ant has been identified exploiting...
Jul 02, 2024NewsroomData Theft / Wi-Fi Security An Australian citizen has been indicted for operating a fraudulent Wi-Fi connection point...
Jul 01, 2024NewsroomSupply Chain / Software Security
Jul 01, 2024NewsroomMobile Security / Surveillance A cybercriminal group referred to as Transparent Tribe has been distributing spyware-infected Android applications...
Jul 01, 2024NewsroomMobile Security / Spyware A cybercriminal group identified as Transparent Tribe has been persistently distributing Android applications containing...
Jul 01, 2024NewsroomSupply Chain Attack / Threat Intelligence Instalments for three distinct software products designed by an Indian organization named...
Jul 01, 2024NewsroomSupply Chain Intrusion / Security Intel Trojanized versions of the installers for three different software products created by...
Secrets lie at the core of each application. They are the passkeys enabling communication between humans, and between machines. Machine...
Central to every application are confidentialities. Authentication that permit human-to-machine and machine-to-machine interaction. Machine authorizations exceed human authorizations by a...
July 1, 2024NewsroomLinux / Vulnerability The team behind OpenSSH has released updates to address a severe security issue that could...