Fortinet has confirmed today that a critical authentication bypass security vulnerability patched last week is being exploited in the wild….
Blog
The threat actors behind IcedID malware phishing campaigns are utilizing a wide variety of distribution methods, likely to determine what…
Callback phishing operations have evolved their social engineering methods, keeping old fake subscriptions lure for the first phase of the…
Hackers are airdropping NFTs to Solana cryptocurrency owners pretending to be alerts for a new Phantom security update that lead to the…
Security researchers have found a new piece of malware targeting Microsoft SQL servers. Named Maggie, the backdoor has already infected hundreds…
Meta has sued several Chinese companies doing business as HeyMods, Highlight Mobi, and HeyWhatsApp for developing and allegedly using “unofficial”…
The BlackByte ransomware gang is using a new technique that researchers are calling “Bring Your Own Driver,” which enables bypassing…
Avast has released a decryptor for variants of the Hades ransomware known as ‘MafiaWare666’, ‘Jcrypt’, ‘RIP Lmao’, and ‘BrutusptCrypt,’ allowing…
The Cheerscrypt ransomware has been linked to a Chinese hacking group named ‘Emperor Dragonfly,’ known to frequently switch between ransomware…
In a perfect example of there being no honor among thieves, a threat actor named ‘Water Labbu’ is hacking into…

