A previously undocumented espionage tool has been deployed against selected governments and other critical infrastructure targets as part of a long-running espionage...
Cybersecurity agencies from the U.K. and the U.S. have laid bare a new malware used by the Iranian government-sponsored advanced persistent threat...
Cybersecurity researchers have turned the spotlight on a new wave of offensive cyberattacks targeting Palestinian activists and entities starting around October 2021...
The cybercrime operators behind the notorious TrickBot malware have once again upped the ante by fine-tuning its techniques by adding multiple layers...
Every single day, hundreds of thousands of internet users are victims of some form of cyberattack. The number of hackers is daily...
Threat actors are increasingly banking on the technique of HTML smuggling in phishing campaigns as a means to gain initial access and...
Multiple cybercriminal groups are leveraging a malware-as-a-service (MaaS) solution to carry out a wide range of malicious software distribution campaigns that result...
An Iranian threat actor has unleashed a new cyberespionage campaign against a possible Lebanese target with a backdoor capable of exfiltrating sensitive...
Malware authors continue to trick users abusing legitimate services, one recent example of this is the new campaign of Raccoon information-stealing malware....
Researchers discovered a new malware campaign from the Winnti threat group that utilizes the supply-chain attacks with a new set of artifacts to...
29 percent of small to medium-sized businesses (SMBs) spend less than $1,000 for their IT security each year. This comes as a...
The tension generated by the cyber warfare between the United States, and its allies, and Iran keeps growing. Although some information security...
Vulnerability testing specialists reported the emergence of a new malware variant capable of removing firmware from Internet of Things (IoT) devices. This...
ESET researchers have discovered that the attackers have been distributing the Plead malware via compromised routers and man-in-the-middle attacks against the legitimate...
A new InfoStealer malware has been identified which targets the windows servers, stealing its sensitive data that includes the login credentials, OS...
Due to hard detection and easy execution of the attack, 2018 has seen excessive crypto mining malware. Cryptojacking attacks are based on...
A new Mobile malware family called Rotexy, launched over 7000 attacks in wide within 3 months of the period from August to October...
Attackers are spreading macros in a campaign aimed at users of freelance/occasional work platforms A new cyberattack campaign has specially focused on...
The PANDA Malware first identified in the year 2016 by Fox IT, the malware primarily focused on banking sectors. With the last...
Android phones have always remained the soft target of malicious threat actors since every now and then we hear about a new...
Stolen credentials, exploits of command-line tools used in 66 percent of attacks. Despite the rise of massive crypto-ransomware attacks, an even more...