N. Korean Hackers ‘Mixing’ macOS Malware Tactics to Evade Detection
Nov 28, 2023NewsroomMalware / Cyber Espionage The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN...
Nov 28, 2023NewsroomMalware / Cyber Espionage The North Korean threat actors behind macOS malware strains such as RustBucket and KANDYKORN...
Nov 22, 2023NewsroomCyber Espionage / Social Engineering North Korean threat actors have been linked to two campaigns in which they...
Nov 22, 2023NewsroomThreat Analysis / Vulnerability Multiple threat actors, including LockBit ransomware affiliates, are actively exploiting a recently disclosed critical...
Nov 21, 2023NewsroomLinux / Rootkit The Kinsing threat actors are actively exploiting a critical security flaw in vulnerable Apache ActiveMQ...
Nov 20, 2023NewsroomMalware / Network Security Threat actors are targeting the education, government and business services sectors with a remote...
The threat actors behind the 8Base ransomware are leveraging a variant of the Phobos ransomware to conduct their financially motivated...
Nov 18, 2023NewsroomCyber Attack / USB Worm Russian cyber espionage actors affiliated with the Federal Security Service (FSB) have been...
Nov 17, 2023NewsroomMalvertising / Malware Threat actors are leveraging manipulated search results and bogus Google ads that trick users who...
The threat actors behind the Rhysida ransomware engage in opportunistic attacks targeting organizations spanning various industry sectors. The advisory comes...
Nov 16, 2023NewsroomCyber Warfare / Threat Intelligence Russian threat actors have been possibly linked to what's been described as the...
Nov 14, 2023NewsroomChatGPT / Malware The Vietnamese threat actors behind the Ducktail stealer malware have been linked to a new...
Nov 13, 2023NewsroomCyber Threat / Malware The threat actors behind a new ransomware group called Hunters International have acquired the...
Nov 09, 2023NewsroomCyber Attack / Malware Iranian nation-state actors have been observed using a previously undocumented command-and-control (C2) framework called...
FBI: Ransomware actors abuse third parties and legitimate system tools for initial access Pierluigi Paganini November 08, 2023 The FBI...
Nov 06, 2023NewsroomCyber Attack / Online Security Google is warning of multiple threat actors sharing a public proof-of-concept (PoC) exploit...