No menu items!
No menu items!
More

    News

    Researchers Uncover How Outlook Vulnerability Could Leak Your NTLM Passwords

    Jan 29, 2024NewsroomVulnerability / NTML Security A now-patched security flaw in Microsoft Outlook could be exploited by threat actors to access NT LAN Manager...

    AllaKore RAT Malware Targeting Mexican Firms with Financial Fraud Tricks

    Jan 27, 2024NewsroomMalware / Software Update Mexican financial institutions are under the radar of a new spear-phishing campaign that delivers a modified version of...

    Critical Cisco Flaw Lets Hackers Remotely Take Over Unified Comms Systems

    Jan 26, 2024NewsroomNetwork Security / Vulnerability Cisco has released patches to address a critical security flaw impacting Unified Communications and Contact Center Solutions products...

    Russian TrickBot Mastermind Gets 5-Year Prison Sentence for Cybercrime Spree

    Jan 26, 2024NewsroomCyber Crime / Malware 40-year-old Russian national Vladimir Dunaev has been sentenced to five years and four months in prison for his...

    Malicious Ads on Google Target Chinese Users with Fake Messaging Apps

    Jan 26, 2024NewsroomMalvertising / Phishing-as-a-service Chinese-speaking users have been targeted by malicious Google ads for restricted messaging apps like Telegram as part of an...

    Perfecting the Defense-in-Depth Strategy with Automation

    Medieval castles stood as impregnable fortresses for centuries, thanks to their meticulous design. Fast forward to the digital age, and this medieval wisdom...

    Microsoft Warns of Widening APT29 Espionage Attacks Targeting Global Orgs

    Jan 26, 2024NewsroomThreat Intelligence / Cyber Attack Microsoft on Thursday said the Russian state-sponsored threat actors responsible for a cyber attack on its systems...

    LODEINFO Fileless Malware Evolves with Anti-Analysis and Remote Code Tricks

    Jan 25, 2024NewsroomFileless Malware / Endpoint Security Cybersecurity researchers have uncovered an updated version of a backdoor called LODEINFO that's distributed via spear-phishing attacks. The...

    SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks

    Jan 25, 2024NewsroomRemote Access Trojan Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. "SystemBC can be...

    Latest articles

    spot_imgspot_img