Over 75 Applications on Google Play with 13M Installations Deliver Adware
Researchers from HUMAN’s Satori Threat Intelligence team found a new adware operation named ‘Scylla’, which is the third wave of an attack reported in...
Hackers Using PowerPoint Mouseover Trick to Infect System with Malware
The Russian state-sponsored threat actor known as APT28 has been found leveraging a new code execution method that makes use of mouse movement in...
Improve your security posture with Wazuh, a free and open source XDR
Organizations struggle to find ways to keep a good security posture. This is because it is difficult to create secure system policies and find...
Critical WhatsApp Bugs Could Have Let Attackers Hack Devices Remotely
WhatsApp has released security updates to address two flaws in its messaging app for Android and iOS that could lead to remote code execution...
Why Continuous Security Testing is a Must for Organizations Today
The global cybersecurity market is flourishing. Experts at Gartner predict that the end-user spending for the information security and risk management market will grow...
Cyber Criminals Using Quantum Builder Sold on Dark Web to Deliver Agent Tesla Malware
A recently discovered malware builder called Quantum Builder is being used to deliver the Agent Tesla remote access trojan (RAT).
"This campaign features enhancements and...
Why Organisations Need Both EDR and NDR for Complete Network Protection
Endpoint devices like desktops, laptops, and mobile phones enable users to connect to enterprise networks and use their resources for their day-to-day work. However,...
Unmasking XE Group: Experts Reveal Identity of Suspected Cybercrime Kingpin
Jun 01, 2023Ravie LakshmananCybercrime / Malware
Cybersecurity researchers have unmasked the identity of one of the individuals who is believed to be associated with...
Zerobot Botnet Emerges as a Growing Threat with New Exploits and Capabilities
Dec 22, 2022Ravie LakshmananInternet of Things / Patch Management
The Zerobot DDoS botnet has received substantial updates that expand on its ability to target...
Researchers Uncover Covert Attack Campaign Targeting Military Contractors
A new covert attack campaign singled out multiple military and weapons contractor companies with spear-phishing emails to trigger a multi-stage infection process designed to...