Ransomware Group Velvet Tempest Deploys DonutLoader and CastleRAT In the realm of cybersecurity, threat actors known as Velvet Tempest have been making waves with their use...
North Korean APT37 Hackers Deploy New Malware to Breach Air-Gapped Networks In a recent development, North Korean hackers belonging to the state-backed group APT37, also known...
The Lazarus Group, also known as Diamond Sleet and Pompilus, has been linked to a recent cyberattack in the Middle East utilizing the Medusa ransomware, as...
Reynolds Ransomware: A New Threat with Built-in Defense Evasion Component A recent disclosure by cybersecurity researchers has shed light on a new ransomware strain known as...
Recent reports from CISA have highlighted the concerning trend of ransomware groups exploiting a critical VMware ESXi sandbox escape vulnerability, previously utilized in zero-day attacks. This...
New GlassWorm Malware Attack Targets macOS via Compromised OpenVSX Extensions A recent malware attack known as GlassWorm has been identified targeting macOS systems through compromised OpenVSX...
Protecting Against Ransomware Attacks: A Comprehensive Guide One of the key challenges with ransomware encryption is the failure to write the encrypted temporary key to the...
Once installed, the app would prompt users to scan their bank card using NFC technology, enabling the malware to steal their financial information. The stolen data...
The group identified as Storm-0249 appears to be transitioning from acting as an initial access broker to utilizing more sophisticated techniques such as domain spoofing, DLL...
Hackers aren’t kicking down the door anymore. They just use the same tools we use every day — code packages, cloud accounts, email, chat, phones, and...
Subscribe to our weekly newsletter below and never miss the latest News or an exclusive offer.