New KLogEXE and FPSpy Malware Deployed by North Korean Hackers in Targeted Intrusions
September 26, 2024Ravie LakshmananCyber Intrusion / Malware Suspicious individuals affiliated with North Korea have been detected utilizing two recent malware...
September 26, 2024Ravie LakshmananCyber Intrusion / Malware Suspicious individuals affiliated with North Korea have been detected utilizing two recent malware...
Sep 26, 2024Ravie LakshmananCyber Surveillance / Hacking Nation-state threat actors supported by Beijing infiltrated a small number of U.S. internet...
September 23, 2024Ravie LakshmananSoftware Safety / Supply Chain Hackers associated with North Korea have been seen utilizing tainted Python bundles...
Sep 19, 2024Ravie LakshmananCyber Attack / Hacking Threat actors have been targeting the construction industry by infiltrating the FOUNDATION Accounting...
Sep 13, 2024Ravie LakshmananSoftware Security / Threat Intelligence Cybercriminals are possibly using publicly accessible proof-of-concept (PoC) exploits for freshly revealed...
Sep 07, 2024Ravie LakshmananCyber Security / Malware North Korean threat actors are using LinkedIn to target developers through fraudulent job...
September 6, 2024Ravie LakshmananSoftware Security / Hacking Cybercriminals have frequently exploited typographical errors to deceive unsuspecting users into visiting harmful...
September 05, 2024Ravie LakshmananCyber Threat / Malware Cyber assailants are presumably utilizing a tool intended for red team exercises to...
September 05, 2024Ravie LakshmananCyber Threat / Malicious Software Adversaries are likely using a utility designed for red teaming exercises to...
A group of hackers from North Korea has exploited a counterfeit Windows video conferencing application posing as FreeConference.com to infect...
Terror actors associated with the RansomHub ransomware group have successfully targeted and impacted 210 victims across various essential areas since...
Aug 30, 2024Ravie LakshmananVirtual Currency / Malicious Software Individuals affiliated with North Korea have been identified releasing a series of...
August 30, 2024Ravie LakshmananCryptojacking / Weakness Cybercriminals are currently taking advantage of a recently fixed, crucial security loophole affecting the...
Researchers have detected that the group responsible for the BlackByte ransomware attack has likely been exploiting a recent fixed vulnerability...
Businesses of various sizes are facing threats from malicious individuals, making cybersecurity awareness training essential. Regrettably, many organizations lack the...