Posts

Cybersecurity
bg
From Misuse to Abuse: AI Risks and Attacks

From Misuse to Abuse: AI Risks and Attacks

AI from the attacker’s perspective: See how cybercriminals are leveraging AI and...

Cybersecurity
bg
North Korean ScarCruft Exploits Windows Zero-Day to Spread RokRAT Malware

North Korean ScarCruft Exploits Windows Zero-Day to Spr...

The North Korean threat actor known as ScarCruft has been linked to the zero-day...

Cybersecurity
bg
5 Techniques for Collecting Cyber Threat Intelligence

5 Techniques for Collecting Cyber Threat Intelligence

To defend your organization against cyber threats, you need a clear picture of t...

Cybersecurity
bg
Astaroth Banking Malware Resurfaces in Brazil via Spear-Phishing Attack

Astaroth Banking Malware Resurfaces in Brazil via Spear...

A new spear-phishing campaign targeting Brazil has been found delivering a banki...

Cybersecurity
bg
GitHub Patches Critical Flaw in Enterprise Server Allowing Unauthorized Instance Access

GitHub Patches Critical Flaw in Enterprise Server Allow...

GitHub has released security updates for Enterprise Server (GHES) to address mul...

Cybersecurity
bg
CISA Warns of Active Exploitation in SolarWinds Help Desk Software Vulnerability

CISA Warns of Active Exploitation in SolarWinds Help De...

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Tuesday adde...

Cybersecurity
bg
TrickMo Banking Trojan Can Now Capture Android PINs and Unlock Patterns

TrickMo Banking Trojan Can Now Capture Android PINs and...

New variants of an Android banking trojan called TrickMo have been found to harb...

Cybersecurity
bg
New Malware Campaign Uses PureCrypter Loader to Deliver DarkVision RAT

New Malware Campaign Uses PureCrypter Loader to Deliver...

Cybersecurity researchers have disclosed a new malware campaign that leverages a...

Cybersecurity
bg
New Linux Variant of FASTCash Malware Targets Payment Switches in ATM Heists

New Linux Variant of FASTCash Malware Targets Payment S...

North Korean threat actors have been observed using a Linux variant of a known m...

Cybersecurity
bg
The Rise of Zero-Day Vulnerabilities: Why Traditional Security Solutions Fall Short

The Rise of Zero-Day Vulnerabilities: Why Traditional S...

In recent years, the number and sophistication of zero-day vulnerabilities have ...

Ce site utilise des cookies pour améliorer votre expérience de navigation. En continuant à utiliser ce site, vous consentez à l'utilisation de cookies. Veuillez consulter notre politique de confidentialité pour plus d'informations sur la façon dont nous traitons vos données.