Description Researchers from Fortinet recently discovered a previously unseen infostealer they dubbed Thirdeye, capable of stealing various sensitiv . . . Read more
Description The ransomware group known as Akira has been carrying out double-extortion attacks against companies globally, utilizing a Linux encrypt . . . Read more
Description A new Malware called EarlyRAT has been discovered, and it is linked to a previously unknown remote access trojan (RAT) employed by . . . Read more
Description A variant of the Mirai botnet was observed targeting at least 22 vulnerabilities residing in IoT devices belonging to D-Link, Arris, Zyx . . . Read more
Description Researchers have recently uncovered a straightforward method of delivering malware to organizations through Microsoft Teams, even with t . . . Read more
Description A Chinese state-sponsored hacking group, commonly known as APT15 or by aliases such as Nickel, Flea, Ke3Chang, and Vixen Panda, has rece . . . Read more
Description A newly discovered malicious software known as “Mystic Stealer” has recently surfaced in the cybercrime community. Since Apr . . . Read more
Description Horabot allows a threat actor to take control of the victim”s Outlook mailbox, steal contacts” email addresses, and send phis . . . Read more
Description Online sellers are being targeted in a new campaign to push the information-stealing malware known as Vidar, allowing threat actors to s . . . Read more
Description A malicious MOVEit Transfer user could create and save a payload within the MOVEit Transfer app. If a victim interacts with the stored p . . . Read more
Description A new campaign distributing the RomCom backdoor malware is impersonating well-known websites or fictional software, tricking users into . . . Read more
Description Researchers at Tencent Labs and Zhejiang University have discovered a new attack called the “BrutePrint”. This new attack br . . . Read more