Ransomware Threats Utilize Vulnerable Drivers to Evade Detection An analysis of endpoint detection and response (EDR) killers has uncovered that 54 of them employ a tactic...
Exploring the Rise of Endpoint Detection and Response (EDR) Killers An in-depth analysis of endpoint detection and response (EDR) killers has uncovered that 54 of these...
Amazon Threat Intelligence has issued a warning about an ongoing Interlock ransomware campaign that is taking advantage of a critical security vulnerability in Cisco Secure Firewall...
The Latest Cybersecurity Threats Identified by CISA The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added three new security vulnerabilities to its Known Exploited Vulnerabilities...
The Use of Artificial Intelligence in Cyberattacks: A Microsoft Perspective Microsoft has highlighted the increasing use of artificial intelligence by threat actors to accelerate cyberattacks across...
Exploitation of Critical BeyondTrust Security Flaw Unleashes Malicious Campaign Recently, threat actors have been leveraging a critical security vulnerability in BeyondTrust Remote Support (RS) and Privileged...
Cybersecurity Researchers Uncover ClickFix Campaign Delivering MIMICRAT Trojan Details have been revealed by cybersecurity researchers regarding a new ClickFix campaign that exploits compromised legitimate websites to...
Grandstream VoIP Vulnerability Exposed: Root Privileges Compromised In a recent discovery, a critical vulnerability in the Grandstream GXP1600 series VoIP phones has been unearthed. This flaw...
DNS Queries Used in ClickFix Social Engineering Attacks to Deliver Malware ClickFix attacks are now utilizing DNS queries as part of their social engineering tactics to...
Malicious Campaign Exploiting Claude Artifacts to Target macOS Users Recently, threat actors have been leveraging Claude artifacts and Google Ads in ClickFix campaigns to distribute infostealer...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.