No menu items!
No menu items!
More

    News

    SystemBC Malware’s C2 Server Analysis Exposes Payload Delivery Tricks

    Jan 25, 2024NewsroomRemote Access Trojan Cybersecurity researchers have shed light on the command-and-control (C2) server of a known malware family called SystemBC. "SystemBC can be...

    7 Key Findings and Upcoming Trends for 2024

    The 2023/2024 Axur Threat Landscape Report provides a comprehensive analysis of the latest cyber threats. The information combines data from the platform's surveillance...

    Critical Jenkins Vulnerability Exposes Servers to RCE Attacks

    Jan 25, 2024NewsroomVulnerability / Software Security The maintainers of the open-source continuous integration/continuous delivery and deployment (CI/CD) automation software Jenkins have resolved nine security...

    China-backed Hackers Hijack Software Updates to Implant “NSPX30” Spyware

    A previously undocumented China-aligned threat actor has been linked to a set of adversary-in-the-middle (AitM) attacks that hijack update requests from legitimate software...

    Tech Giant HP Enterprise Hacked by Russian Hackers Linked to DNC Breach

    Jan 25, 2024NewsroomCyber Attack / Data Breach Hackers with links to the Kremlin are suspected to have infiltrated information technology company Hewlett Packard Enterprise's...

    New CherryLoader Malware Mimics CherryTree to Deploy PrivEsc Exploits

    Jan 25, 2024NewsroomThreat Intelligence / Malware Research A new Go-based malware loader called CherryLoader has been discovered by threat hunters in the wild to...

    U.S., U.K., Australia Sanction Russian REvil Hacker Behind Medibank Breach

    Jan 24, 2024NewsroomCryptocurrency / Cybercrime Governments from Australia, the U.K., and the U.S. have imposed financial sanctions on a Russian national for his alleged...

    The Unknown Risks of The Software Supply Chain: A Deep-Dive

    Jan 24, 2024The Hacker NewsVulnerability / Software Security In a world where more & more organizations are adopting open-source components as foundational blocks in...

    Kasseika Ransomware Using BYOVD Trick to Disarms Security Pre-Encryption

    The ransomware group known as Kasseika has become the latest to leverage the Bring Your Own Vulnerable Driver (BYOVD) attack to disarm...

    Latest articles

    spot_imgspot_img