thumbnail Automating Pikabot’s String Deobfuscation
thumbnail World-first “Cybercrime Index” ranks countries by cybercrime threat
thumbnail Muddled Libra’s Evolution to the Cloud
thumbnail Bringing process injection into view(s): exploiting all macOS apps using nib files · Sector 7
thumbnail Unveiling the Fallout: Operation Cronos' Impact on LockBit Following Landmark Disruption
thumbnail Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks | Trend Micro (US)
thumbnail CVE-2024-27198 and CVE-2024-27199: JetBrains TeamCity Multiple Authentication Bypass Vulnerabilities (FIXED)
thumbnail CVE-2024-21412: Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day
thumbnail Kasseika Ransomware Deploys BYOVD Attacks Abuses PsExec and Exploits Martini Driver 
thumbnail Qualys TRU Discovers Important Vulnerabilities in GNU C Library’s syslog()
thumbnail Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
thumbnail Anthropic researchers find that AI models can be trained to deceive
thumbnail Using AI to Automatically Jailbreak GPT-4 and Other LLMs in Under a Minute
thumbnail InfectedSlurs Botnet Spreads Mirai via Zero-Days
thumbnail Telekopye: Chamber of Neanderthals’ secrets
thumbnail InfectedSlurs Botnet Spreads Mirai via Zero-Days
thumbnail Uncovering thousands of unique secrets in PyPI packages
thumbnail A Closer Look at ChatGPT's Role in Automated Malware Creation
thumbnail Raising Online Defenses Through Transparency and Collaboration | Meta
thumbnail #FuckStalkerware pt. 3 - ownspy got, well, owned
thumbnail The New Frontline of Geopolitics | Understanding the Rise of State-Sponsored Cyber Attacks
thumbnail Researchers watched 100 hours of hackers hacking honeypot computers
thumbnail Midnight Blizzard conducts targeted social engineering over Microsoft Teams
thumbnail Chinese Threat Actors Targeting Europe in SmugX Campaign
thumbnail Condi DDoS Botnet Spreads via TP-Link's CVE-2023-1389
thumbnail New Magecart-Style Campaign Abusing Legitimate Websites to Attack Others | Akamai
thumbnail New macOS vulnerability, Migraine, could bypass System Integrity Protection | Microsoft Security Blog
thumbnail EDR bypassing via memory manipulation techniques | WithSecure™ Labs
thumbnail BlackCat Ransomware Deploys New Signed Kernel Driver
thumbnail Visualizing QakBot Infrastructure
thumbnail The malware threat landscape: NodeStealer, DuckTail, and more
thumbnail FIN7 tradecraft seen in attacks against Veeam backup servers
thumbnail Rorschach – A New Sophisticated and Fast Ransomware
thumbnail Information on Attacks Involving 3CX Desktop App
thumbnail New OpcJacker Malware Distributed via Fake VPN Malvertising
thumbnail Shining Light on Dark Power: Yet Another Ransomware Gang
thumbnail Uncle Sow: Dark Caracal in Latin America
thumbnail Enigma Stealer Targets Cryptocurrency Industry with Fake Jobs
thumbnail Accidentally Crashing a Botnet
thumbnail Wi-Spy
thumbnail Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor
thumbnail LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company
thumbnail Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries
thumbnail Domestic Kitten campaign spying on Iranian citizens with new FurBall malware
thumbnail SafeBreach Uncovers Fully Undetectable Powershell Backdoor
thumbnail BianLian Ransomware Encrypts Files in the Blink of an Eye
thumbnail Black Basta Ransomware Gang Infiltrates networks via QAKBOT, Brute Ratel, and Cobalt Strike
thumbnail POLONIUM targets Israel with Creepy malware
thumbnail A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion – NCC Group Research
thumbnail Slack’s and Teams’ Lax App Security Raises Alarms
thumbnail So RapperBot, What Ya Bruting For?
thumbnail Flubot: the evolution of a notorious Android Banking Malware
thumbnail Conti vs. LockBit: A Comparative Analysis of Ransomware Groups
thumbnail Telerik UI exploitation leads to cryptominer, Cobalt Strike infections
thumbnail Lyceum .NET DNS Backdoor
thumbnail Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
thumbnail Microsoft Diagnostic Tool "DogWalk" Package Path Traversal Gets Free Micropatches (0day/WontFix)
thumbnail SVCReady: A New Loader Gets Ready
thumbnail Analysis and Attribution of the Eternity Ransomware: Timeline and Emergence of the Eternity Group
thumbnail XLoader Botnet: Find Me If You Can
thumbnail New Linux-Based Ransomware Cheerscrypt Targets ESXi Devices
thumbnail Large-scale Analysis of DNS-based Tracking Evasion - broad data leaks included?
thumbnail The IO Offensive: Information Operations Surrounding the Russian Invasion of Ukraine
thumbnail Exploiting an Unbounded memcpy in Parallels Desktop
thumbnail Multi-factor Authentication to Generate $27 Billion Globally for Mobile Operators in 2022, Juniper Research Study Finds
thumbnail Web ad firms scrape email addresses before you know it
thumbnail npm Supply Chain Attack Targeting Germany-Based Companies
thumbnail Industroyer2: Industroyer reloaded
thumbnail MacOS SUHelper Root Privilege Escalation Vulnerability A Deep Dive Into CVE-2022-22639
thumbnail DEV-0537 criminal actor targeting organizations for data exfiltration and destruction
thumbnail Gas Is Too Expensive; Let’s Make It Cheap!
thumbnail Raccoon Stealer: “Trash panda” abuses Telegram
thumbnail Iranian linked conglomerate MuddyWater comprised of regionally focused subgroups
thumbnail Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk
thumbnail ModifiedElephant APT and a Decade of Fabricating Evidence