A “multi-faceted campaign” has been observed abusing legitimate services like GitHub and FileZilla to deliver an array of stealer malware and banking...
Cyber criminals have utilized cryptocurrency exchanges like Binance for money laundering due to the pseudonymous nature of digital currencies. Here’s a general...
A new malware campaign has been observed making use of malicious OpenBullet configuration files to target inexperienced cyber criminals with the goal...
Sysdig, a company that specializes in cybersecurity intelligence, uncovered a sophisticated hacking operation known as Scarleteel in February. Since then, Scarleteel has...
EvilExtractor is an attack tool that is meant to target Windows operating systems to extract data and files from endpoint devices. EvilExtractor...
At the end of November 2022, OpenAI announced the introduction of ChatGPT, the new interface for its Large Language Model (LLM), which...
A nascent Go-based malware known as Aurora Stealer is being increasingly deployed as part of multiple campaigns designed to steal sensitive information...
Following a hack, one of the biggest and most sophisticated telescopes in the world had to halt operations. A attack on its...
In a coordinated operation on October 10 throughout the three nations, 31 people were detained. A total of 22 addresses were raided,...
A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT). “This campaign...
A 24-year-old Australian national has been charged for his purported role in the creation and sale of spyware for use by domestic...
Threat actors are increasingly abusing Internet Information Services (IIS) extensions to backdoor servers as a means of establishing a “durable persistence mechanism.”...
One of the attack methods that hackers can use is a simple Word document that they send in the mail. They use...
Microsoft has surprised key parts of the security community with its decision to quietly reverse course and allow untrusted macros to open...
Credential abuse is something that happens only to CEOs or very rich people or employees of fortune 500 companies right? Nope. It’s...
A businessman nearly lost $6 million to hackers, but one word saved his fortune from falling into accounts of hackers and disappearing...
Cybersecurity researchers have detailed the workings of a fully-featured malware loader dubbed PureCrypter that’s being purchased by cyber criminals to deliver remote...
Microsoft has developed multiple protection mechanisms against some popular hacking variants, including the malicious use of macros. Sometimes, threat actors send Office...
At the end of 2021, the Non-Fungible Token (NFT) projects Monkey Kingdom and Fractal were targeted by the same hacking variant, in...
Authorities in India arrested three individuals accused of participating in a fraudulent operation in order to cheat on the presentation of an...
In a security report, Microsoft detailed the finding of a critical vulnerability in macOS whose successful exploitation would allow threat actors to...