A cyberespionage threat actor tracked as Billbug (a.k.a. Thrip, Lotus Blossom, Spring Dragon) has been running a campaign targeting a…
hackers
Victims of ransomware attacks in the manufacturing and production industry are making the biggest ransom payments, with the average ransom…
The threat actors behind IcedID malware phishing campaigns are utilizing a wide variety of distribution methods, likely to determine what…
The BlackByte ransomware gang is using a new technique that researchers are calling “Bring Your Own Driver,” which enables bypassing…
In a perfect example of there being no honor among thieves, a threat actor named ‘Water Labbu’ is hacking into…
The notorious North Korean hacking group ‘Lazarus’ was seen installing a Windows rootkit that abuses a Dell hardware driver in…
Threat analysts at Palo Alto Networks (Unit 42) discovered that the phenomenon of ‘domain shadowing’ might be more prevalent than…
Hackers are more frequently using social engineering attacks to gain access to corporate credentials and breach large networks. One component…
Microsoft says an Iranian state-sponsored threat group it tracks as DEV-0270 (aka Nemesis Kitten) has been abusing the BitLocker Windows…
A reverse-proxy Phishing-as-a-Service (PaaS) platform called EvilProxy has emerged, promising to steal authentication tokens to bypass multi-factor authentication (MFA) on…