Jan 16, 2024NewsroomBotnet / Malware
The remote access trojan (RAT) known as Remcos RAT has been found being propagated via webhards by disguising it...
Jan 16, 2024The Hacker NewsData Security / Privacy Compliance
Explore how an advanced exposure management solution saved a major retail industry client from ending...
Jan 16, 2024NewsroomCryptocurrency / Windows Security
Threat actors have been observed leveraging a now-patched security flaw in Microsoft Windows to deploy an open-source information...
Jan 16, 2024NewsroomCryptocurrency / Cyber Threat
The operators behind the now-defunct Inferno Drainer created more than 16,000 unique malicious domains over a span of...
Jan 11, 2024NewsroomCloud Security / Cyber Attacks
A new Python-based hacking tool called FBot has been uncovered targeting web servers, cloud services, content management...
Jan 11, 2024NewsroomVulnerability / Cyber Attack
Cybersecurity researchers have developed a proof-of-concept (PoC) code that exploits a recently disclosed critical flaw in the Apache...
Jan 11, 2024NewsroomCybersecurity / Software Security
The ubiquity of GitHub in information technology (IT) environments has made it a lucrative choice for threat actors...
Jan 12, 2024NewsroomCyber Attack / Vulnerability
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical security vulnerability impacting Microsoft SharePoint Server...
Jan 12, 2024NewsroomCryptocurrency / Malware
Cybersecurity researchers have identified a new attack that exploits misconfigurations in Apache Hadoop and Flink to deploy cryptocurrency miners...