The credential-phishing attack leverages social engineering and brand impersonation techniques to lead users to a spoofed MetaMask verification page.
The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities.
The commercial-grade surveillance software initially was used by law enforcement authorities in Italy in 2019, according to a new report.
Multiple cybercrime groups have been spotted selling stolen credentials and other sensitive personal information pilfered from travel-related websites.
The Japanese-language Panchan botnet has been discovered stealing SSH keys from Linux servers across Asia, Europe, and North America, with a focus on telecom and education providers.
The DoS vulnerability allows an attacker to create a Brotli “zip bomb,” resulting in acute performance issues on Envoy proxy servers.
A Linux-based banking Trojan is a master at staying under the radar.
The commission argues that legislative action is needed to ensure a well-functioning market for AI systems that balances benefits and risks.
The malware is using spreadsheets, documents, and other types of Microsoft Office attachments in a new and improved version that is often able to bypass email gateway-security scanners.
The company’s vision for the future of cloud security is based on simplified, horizontal coverage across multiple cloud platforms.
The new ransomware strain Black Basta is now actively targeting VMware ESXi servers in an ongoing campaign, encrypting files inside a targeted volumes folder.
The innovative ransomware targets NAS devices, has a multitiered payment and extortion scheme as well as a flexible configuration, and takes a heavily automated approach.
The tool underpins cybersecurity capabilities including SIEM, SOAR, compliance automation, and vulnerability management.
The attack on Israeli organizations is the latest in a long line of attempts to compromise supply chains, as the APT looks to leverage that access to target a multitude of potential victims.
The malware targets Windows users via Trojanized downloads of cracked or pirated software and then starts in on cryptocurrency mining and clipboard hijacking.
Organizations must ensure their kubelets and related APIs aren’t inadvertently exposed or lack proper access control, offering an easy access point for malicious actors.
The malware’s abuse of PowerShell makes it more dangerous, allowing for more advanced attacks such as ransomware, fileless malware, and malicious code memory injections.
Global ransomware incidents target everything from enterprise servers to grounding an airline, with one India-based group even taking a Robin Hood approach to extortion with the “GoodWill” strain.
A DDoS campaign observed by Akamai from actors claiming to be REvil would represent a major pivot in tactics for the gang.