No menu items!
No menu items!
More

    News

    RedCurl Cybercrime Group Abuses Windows PCA Tool for Corporate Espionage

    Mar 14, 2024NewsroomCyber Espionage / Malware The Russian-speaking cybercrime group called RedCurl is leveraging a legitimate Microsoft Windows component called the Program Compatibility Assistant...

    3 Things CISOs Achieve with Cato

    Being a CISO is a balancing act: ensuring organizations are secure without compromising users' productivity. This requires taking multiple elements into consideration, like...

    Ande Loader Malware Targets Manufacturing Sector in North America

    Mar 14, 2024NewsroomCyber Threat / Malware The threat actor known as Blind Eagle has been observed using a loader malware called Ande Loader to...

    DarkGate Malware Exploits Recently Patched Microsoft Flaw in Zero-Day Attack

    Mar 14, 2024NewsroomMalware / Cyber Attack A DarkGate malware campaign observed in mid-January 2024 leveraged a recently patched security flaw in Microsoft Windows as...

    Cybercriminals Deploying VCURMS and STRRAT Trojans via AWS and GitHub

    Mar 13, 2024NewsroomPhishing Attack / Threat Intelligence A new phishing campaign has been observed delivering remote access trojans (RAT) such as VCURMS and STRRAT...

    PixPirate Android Banking Trojan Using New Evasion Tactic to Target Brazilian Users

    Mar 13, 2024The Hacker NewsFinancial Fraud / Mobile Security The threat actors behind the PixPirate Android banking trojan are leveraging a new trick to...

    Demystifying a Common Cybersecurity Myth

    Mar 13, 2024The Hacker NewsApp Security / Cyber Security One of the most common misconceptions in file upload cybersecurity is that certain tools are...

    Latest articles

    spot_imgspot_img