Microsoft says that cryptocurrency investment companies have been targeted by a threat group it tracks as DEV-0139 via Telegram groups…
Blog
Hackers are abusing the open-source Linux PRoot utility in BYOF (Bring Your Own Filesystem) attacks to provide a consistent repository…
A financially motivated threat actor is hacking telecommunication service providers and business process outsourcing firms, actively reversing defensive mitigations applied…
The North Korean ‘Lazarus’ hacking group is linked to a new attack spreading fake cryptocurrency apps under the made-up brand,…
A new set of Android malware, phishing, and adware apps have infiltrated the Google Play store, tricking over two million people…
The FBI and CISA revealed in a new joint security advisory that the Cuba ransomware gang raked in over $60…
An Android malware campaign masquerading as reading and education apps has been underway since 2018, attempting to steal Facebook account…
Google researchers said on Wednesday they have linked a Barcelona, Spain-based IT company to the sale of advanced software frameworks…
Security researchers found a previously unknown backdoor they call Dolphin that’s been used by North Korean hackers in highly targeted…
USB devices are being used to hack targets in Southeast Asia, according to a new report by cybersecurity firm Mandiant….